
تعداد نشریات | 21 |
تعداد شمارهها | 610 |
تعداد مقالات | 9,026 |
تعداد مشاهده مقاله | 67,082,754 |
تعداد دریافت فایل اصل مقاله | 7,656,167 |
Implementation of hybrid cryptographic schemes in a cloud environment for enhanced medical data security | ||
International Journal of Nonlinear Analysis and Applications | ||
دوره 12، شماره 2، بهمن 2021، صفحه 1785-1800 اصل مقاله (896.83 K) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22075/ijnaa.2021.5316 | ||
نویسندگان | ||
A Priya* ؛ S Saradha | ||
Department of Computer Science, VISTAS, Chennai, India. | ||
تاریخ دریافت: 06 بهمن 1399، تاریخ بازنگری: 22 اردیبهشت 1400، تاریخ پذیرش: 23 خرداد 1400 | ||
چکیده | ||
Nowadays, several security architectures in cloud computing were employed in several applications, but they failed to secure the cloud data entirely. The current approaches use the ensemble algorithm for the decryption and encryption purpose to enhance the security technique. The input medical dataset is usually raw and might contain redundant packets and missing values. Initially, the data is preprocessed by means of the normalization technique. By using Enhanced Principal Component Analysis (EPCA) method, various attributes of the data can be obtained. After the extraction process, the classification mechanism is carried out for recognizing the attacks. The attack is predicted and is classified by means of the Adaptive AlexNet CNN classifier algorithm. A hybrid cryptographic technique in a cloud environment for improving the security rate and providing privacy preservation of the medical data in the cloud environment is presented. The proposed work mainly concentrates mostly on implementing hybrid cryptographic schemes which include AES algorithm, enhanced honeypot algorithm, SHA3 hashing and OTP in the cloud environment. It enhances the security of the data to a great extent. Thus, the presented technique is secured effectively that makes the intruders difficult to access the system as they need to attain control over servers. | ||
کلیدواژهها | ||
cloud computing؛ encryption؛ decryption؛ Enhanced Principal Component Analysis؛ Adaptive AlexNet CNN classifier؛ cryptographic technique؛ enhanced honeypot algorithm؛ SHA3 hashing and OTP | ||
مراجع | ||
[1] M. H. R. Al-Shaikhly, H. M. El-Bakry and A. A. Saleh, Cloud security using Markov chain and genetic algorithm, Int. J. Elect. Inf. Engin. 8(2) (2018) 96–106.[2] A. Aldweesh, A. Derhab and A. Z. Emam, Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues, Knowledge-Based Syst. 189(105124) (2020). [3] SH. Aljawarneh, M. B. Yassein and W. A. Talafha, A resource-efficient encryption algorithm for multimedia big data, Mult. Tools Appl. 76(21) (2017) 22703–22724. [4] CH. Beyene and P. Kamat, Survey on Prediction and Analysis the Occurrence of Heart Disease Using Data Mining Techniques, Int. J. Pure Appl. Math. 118(8) (2018) 165–174. [5] N. Deepa and P. Pandiaraja, E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption, J. Ambient Intel. Human. Comput. 12(5) (2020) 1–11. [6] R. Devi and J. M. Shyla, Analysis of various data mining techniques to predict diabetes mellitus, Int. J. Appl. Engin. Res. 11(1) (2016) 727–730. [7] M. Durairaj and G. Kalaiselvi, Prediction of diabetes using soft computing techniques-A survey, Int. J. Sci. Tech. Res. 4(3) (2015). [8] R. Gupta, P. Kanungo and N. Dagdee, HD-MAABE: Hierarchical Distributed Multi-Authority Attribute Based Encryption for Enabling Open Access to Shared Organizational Data, In: G. S. Tomar, N. S. Chaudhari, J. L. V. Barbosa and M. K. Aghwariya (eds) International Conference on Intelligent Computing and Smart Communication 2019. Algorithms for Intelligent Systems. Springer, 2020. [9] V. S. V. Hema and R. Kesavan, ECC based secure sharing of healthcare data in the health cloud environment, Wireless Personal Commun. 108(2) (2019) 1021–1035. [10] F. Huang, J. Huang and Y. Shi, New framework for reversible data hiding in encrypted domain, IEEE Trans. Inf. Forensics Sec. 11(12) (2016) 2777–2789. [11] P. Kumar and SH. B. Rana, Development of modified AES algorithm for data security, Optik-Int. J. Light Elect. Opt. 127(4) (2016) 2341–2345. [12] S. S. Kumar, SH. Prasad, M. Parimala and DR. G. M. Someswar, Scalable and secure sharing of personal health records in cloud computing using attribute based encryption, Int. J. Adv. Comput. Tech. 5(6) (2016). [13] S. Kumari, M. Karuppiah, A. K. Das, X. Li, F. Wu and N. Kumar, A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers, J. Supercom. 74(12) (2018) 6428–6453. [14] P. Nagar, H. K. Menaria and M. Tiwari, Novel Approach of Intrusion Detection Classification Deeplearning Using SVM, In: A. K. Luhach, J. A. Kosa, R. CH. Poonia, X. Gao and D. Singh (eds) First International Conference on Sustainable Technologies for Computational Intelligence: Proceedings of ICTSCI 2019, Springer Nature, 2020. [15] P. Preethi and R. Asokan, A high secure medical image storing and sharing in cloud environment using hex code cryptography method—secure genius, J. Med. Imag. Health Inf. 9(7) (2019) 1337–1345. [16] A. Priya, Dr. S. Saradha, A detailed survey of the security issues and defensive tactic in cloud background, J. Adv. Res. Dyn. Cont. Syst. 11(11) (2019) 606–611. [17] A. Priya, Dr. S. Saradha, An efficient prediction and privacy preservation using enhanced blowfish cryptographic scheme for cloud security, HTL J. 26(11) (2020) 1–9. [18] A. Priya, Dr. S. Saradha, An overview on cloud computing frameworks and review on cloud security schemes, J. Crit. Rev. 7(17) (2020) 3303–3308. [19] M. Rasori, P. Perazzo and G. Dini, A lightweight and scalable attribute-based encryption system for smart cities, Comput. Commun. 149(2020) (2020) 78–89. [20] M. Sakthivanitha and S. Saradha, Survey based on security aware caching scheme for IoT based information centric networking, EAI Endorsed Trans. Energy Web 8(32) (2020) e2. [21] F. Sammy and S. M. C. Vigila, An Efficient Multiauthority Attribute-Based Encryption Technique for Storing Personal Health Record by Compressing the Attributes, In: J. Jayakumari, G. K. Karagiannidis, M. Ma and S. A. Hossain (eds) Advances in Communication Systems and Networks. Lecture Notes in Electrical Engineering, Springer, Singapore, 2020. [22] H. Wang, SH. Wu, M. Chen and W. Wang, Security protection between users and the mobile media cloud, IEEE Commun. Mag. 52(3) (2014) 73–79. [23] H. Xiong, H. Zhang and J. Sun, Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing, IEEE Syst. J. 13(3) (2018) 2739–2750. [24] F. Zafar, A. Khan, S. U. R. Malik, M. Ahmed, A. Anjum, M. I. Khan, N. Javed, M. Alam and F. Jamil, A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends, Comput. Sec. 65(2017) (2017) 29–49. | ||
آمار تعداد مشاهده مقاله: 15,773 تعداد دریافت فایل اصل مقاله: 655 |