International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116 | Views: 335

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017 | Popularity: 6.6 / 10


     

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal


Abstract: Search over encrypted data is a critically important enabling technique in cloud computing, where encryption-before outsourcing is a crucial answer for ensuring user information security in the untrusted cloud server condition. In this work we focus on Role- based authentication is a combination of symmetric key cryptography and public key cryptography where by every encryption process needs Data, Public Key, Group Key, The Policy is a set of rule that can be specified as chain also for e. g. , in the context of hospital a policy can be given as {doctor, patient} which means anybody from the doctors group or patient group can simultaneously decrypt the document on the other hand a policy can be specified as chain policy for instance{doctor}, {patient} This is known as nested policy. In such cases a patient can decrypt the document only when that is decrypted by doctors first, Policy based encryption is becoming popular in an enterprise context where different authorities require different permission and privacy settings for the access of the records. In this work we have develop a novel CP-ABE (Cryptography-Attributed based Encryption) based technique in an enterprise hospital context deployed in a local cloud with fog computing architecture. Our proposed system provides different level of encryption, decryption, authentication, authorization and privacy setting for doctors in the context of patients, medical image, image feature records. The data used for communication between doctor and patient is images of skin cancer and related symptoms. Both text and image is encrypted and decrypted by AES (Advanced Encryption Standard) during data transfer. Further machine learning Bayesian Classifier approach is used to diagnose abnormality in the skin cancer image. In this work we demonstrate the use of CP-ABE with human entities as well as in the context of machine learning. The overall work demonstrate the entire process of medical scanning in an enterprise hospital application both plain record encryption and image encryption with the help of CP-ABE. In order to demonstrate the efficiency of the system we have developed a simple medical application where doctor encrypt text and image which can visualize only their own patients data and the usability of machine learning image classification technique which automatically can retrieve the observation of the image as abnormal or normal. This proves machine learning and performance evaluation shows efficiency of our system.


Keywords: Cloud computing, CP-ABE, AES, Text and Image Search, Symmetric key Cryptography


Edition: Volume 6 Issue 6, June 2017


Pages: 1495 - 1500



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Nirupama Devangaon, Dr Suvarna Nandyal, "Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 1495-1500, https://www.ijsr.net/getabstract.php?paperid=ART20174567, DOI: https://www.doi.org/10.21275/ART20174567



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 11 Issue 9, September 2022

Pages: 837 - 842

An Optimized IoT-Enabled Big Data Analytics Architecture for Edge-Cloud Computing Using Deep Learning

Bharathi K.

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 11, November 2024

Pages: 844 - 850

Data-Driven Decision Making: Advanced Database Systems for Business Intelligence

Maria Anurag Reddy Basani, Anudeep Kandi

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2084 - 2088

A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections

Rupali Tanaji Waghmode, Nikita J. Kulkarni

Share this Article
Top