SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Middle East Journal of Applied Science & Technology
Vol.5, Iss.2, Pages 53-60, April-June 2022
ISSN: 2582-0974 [53] www.mejast.com
Secure Data Access Using ABE Process Model
Sasireka S1*
, Priyadarseni P2
, Sanchana Sri R3
, Sushma R4
& Swathi P5
1-5
Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, India.
Corresponding author email: sasireka.scse@sece.ac.in*
DOI: http://doi.org/10.46431/MEJAST.2022.5207
Copyright © 2022 Sasireka S et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits
unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Article Received: 22 February 2022 Article Accepted: 27 April 2022 Article Published: 31 May 2022
1. Introduction
As computing technology has hastily increased cloud computing has earned a lot of reputation in current years via
packages, services, garages, and computing over the Internet. It is typically applied in lots of domain names like
Medical Science, Agriculture, Business, Information Technology, and lots others. Additionally, it encourages
useful resource provisioning edibility and cost-powerful decoupling administrations.
Smart gadgets like smartphones and drugs are regularly becoming an essential constituent of human lifestyles as a
handy and powerful device for conversation that isn't always constrained with the aid of using location and time.
Smart tool customers gather wealthy enjoy of various administrations from cellular apps inclusive of Google
Applications and iPhone packages that run at the faraway servers the use of wi-fi connectivity to the network. The
unification of cloud computing and cellular telephones is called Mobile Cloud Computing (MCC) [6-9]. As MCC
can provide some significant beets, for example, extended battery lifestyles and high-degree garage capability,
scalability, adaptability, and some key needs hold on being a sign that can’t challenge MCC [11-13].
1.1. Mobile Cloud Computing
Mobile Cloud Computing (MCC) is the aggregate of cloud computing and cell computing to carry wealthy
computational assets to cell customers, and community operators, in addition to cloud computing providers. The
closing intention of MCC is to allow the execution of wealthy cell packages on a plethora of cell gadgets, with a
wealthy person's experience. MCC affords commercial enterprise possibilities for cell community operators in
addition to cloud providers. More comprehensively, MCC may be described as "a wealthy cell computing era that
leverages unified elastic assets of various clouds and community technology closer to unrestricted functionality,
storage, and mobility to serve a mess of cell gadgets anywhere, whenever via the channel of Ethernet or Internet
irrespective of diverse platforms and systems and the cost for provided services is dependent on the use of those
services. Cloud computing is the on-call for the availability of laptop machine assets, in particular records storage
ABSTRACT
Despite the severe and great inherited profits of Mobile Cloud Computing (MCC) in healthcare, its boom is being hindered with the aid of using
privateers and protection challenges. Such problems require the utmost urgent interest to realize their complete scale and green usage. There is a want
for stable health information geographically. To completely make use of the fitness services, it's far important to install vicinity the demanded
protection practices for the prevention of protection breaches and vulnerabilities. Hence, this research is deliberated directly to offer
requirement-orientated fitness statistics protection the use of the Modular Encryption Standard (MES) primarily established totally at the layered
modeling of the safety measures. The overall performance evaluation shows that the proposed paintings excel, in comparison to different usually
used algorithms towards the fitness information security on the MCC surroundings in phrases of higher overall performance and auxiliary qualitative
protection ensuring measures.
Keywords: Mobile cloud computing, Health information, Modular encryption standard.
Middle East Journal of Applied Science & Technology
Vol.5, Iss.2, Pages 53-60, April-June 2022
ISSN: 2582-0974 [54] www.mejast.com
(cloud storage) and computing power, without direct lively control via way of means of the person. The period is
normally used to explain records facilities to be had to many customers over the Internet. Large clouds, important
today, frequently have capabilities disbursed over a couple of places from relevant servers. If the relationship with
the person is highly close, it can be a distinctive part server.
1.2. Requirement-Oriented Approach
Considering the improvement of outcome and development process, demand is seen as unique filed bodily or useful
want that a specific pattern, outcome or manner objectives to meet the expectations. This can be generally utilized
with a proper experience in engineering design, together with an instance in structures engineering, software
program engineering, or employer engineering. This can be seen as a huge idea that might communicate on the
occasion desired function, feature, capacity, property, or best of a gadget for it to have price and application to a
consumer, institution, intrinsic client, or different collaborators. Needs might include one-of-a-kind tiers of
specificity; for an instance, a demand definition or need "spec" (regularly inexactly cited as "the" spec/specs,
however, there are sincerely one-of-a-kind types of specifications) points to a deliberate, incredibly understandable
(and regularly valued) requirement (or on occasion, a compilation of needs) to be happy through a substance,
pattern, outcome.
2. Related Work
The phase affords the literature study of the Health Information safety risks and methods towards making sure its
privacy within the cloud. Dynamic safety and privateness dangers and threats of Mobile Cloud Computing have
seemed as tremendous problems. Mobile Cloud Computing’s customers and companies are significantly dependent
on their supplied resources. Numerous studies tried and answers were proposed to wait for privateness and safety
challenges. Tele-tracking has been applied to remotely display the affected person’s fitness, such as scientific hubs
and critical care facilities. Currently, it's far an amazing e-fitness service. By the usage of information technology,
the prognosis, assessment, and remedy for the affected person are being accomplished. While appearing prognosis
and remedy, getting right of entry to Electronic Health Information (EHI) is necessary. Despite the rising
recognition of Electronic Health Information cloud-primarily depends totally on protection and tracking, there are
various safety risks. In the middle of those risks, assault for records robbery is a key challenge.
Y.Al-Issa et al [1] have proposed Cloud computing is an encouraging era this is anticipated to convert the medical
enterprise. Cloud computing contains numerous advantages like affability, price and minimal use of electricity,
useful resource allocating, and rapid disposal. This paper examines the usage of cloud computing inside the
healthcare enterprise and exceptional cloud protection and privateer’s risks. E- centralization of facts in the cloud
increases many protections and privacy issues for people and healthcare carriers, is centralization of facts gives
invaders with one-prevent honey-pot to thieve facts and seize facts in movement and movements facts possession
to the cloud provider carriers; therefore, the people carriers lose manipulate over touchy facts. Subsequently,
protection, privateness, productivity, and flexibility issues are obstructing the magnificent acquisition of the cloud
era. The located condition of the artwork answers deals with handiest a subset of these issues in this project. There
may be a direct want for a comprehensive answer which stables the controverting needs.
Middle East Journal of Applied Science & Technology
Vol.5, Iss.2, Pages 53-60, April-June 2022
ISSN: 2582-0974 [55] www.mejast.com
H.Jin et al [2] have proposed in the virtual healthcare generation, that it's far of the maximum significance to
harness scientific records scattered throughout healthcare establishments to guide in-intensity information
evaluation and attain individualized medical hubs. Nevertheless, the cyber infrastructure obstacles of medical care
corporations and privateness effusion issue region boundaries at the companioning of scientific records.
Blockchain, as a common registry distinguished through its clarity, child-proof, and devolution, could assist
construct in steady scientific information change community. This paper surveys the ultra-modern schemes on
steady and privateness-keeping scientific information dividing of the beyond a focal point on blockchain-primarily
depends on total methods. This is divided into permissionless blockchain-primarily which depends on total
methods and permissions blockchain-primarily based methods and examine blessings and drawbacks. Additionally
speak capacity studies subjects on blockchain-primarily based scientific information sharing. Data is an asset with
value, especially these days while cloud computing, large information, and interconnection of factors are
embracing every other.
D.Liu et al [3] has proposed Internet of Things (IoT) is gaining growing popularity. Overwhelming volumes of
records are generated through IoT devices. Those records after analytics offer considerable records that would
substantially gain IoT programs. Different from conventional programs, IoT programs together with environmental
monitoring, clever navigation, and clever healthcare include new necessities together with mobility, real-time
response, and area awareness. However, the conventional cloud computing paradigm cannot fulfill those needs
because of centralized processing and being away far from nearby devices. Hence, area computing become added
to carry out records processing and garage within the fringe of networks, that's in the direction of records reasserts
than cloud computing, accordingly green and area-aware.
S.Chenthara et al [4] have proposed a systematic and complete evaluation of safety and privateness-retaining
demanding situations in e-fitness answers showing diverse privateness retaining tactics to make certain privateness
and safety of digital fitness documents (Electronic Health Records) within the cloud. The project culminates the
studies demanding situations and instructions regarding cyber safety to construct a complete safety version for
EHR. It conveys an in-depth look at within the IEEE, Science Direct, Google Scholar, PubMed, and ACM for
papers on Electronic Health Record method posted between 2000 and 2018 and outlined them in phrases of the
structure sorts in addition to assessment techniques. On examination of diverse elements of numerous reports and
recognized the subsequent functions: 1) Electronic Health Records’ safety and privateness; 2) safety and
privateness necessities of e-fitness information within the cloud; 3) Electronic Health Record cloud structure, and;
4) various Electronic Health Record cryptographic and non-cryptographic tactics. Additionally, a few critical
troubles are spoken and the sufficient possibilities for superior studies associated with the safety and privateness of
EHRs. Since huge information offers a fantastic deposit of statistics and information in telemedicine supplications,
severe privateness, and safety demanding situations that require instant interest exist.
Algarni et al [5] have proposed Advances in the wi-fi era have resulted within the improvement of clever healthcare
systems (SHS). In SHS, sensors, wearables, and gadgets screen a patient's critical parameters. These parameters are
transmitted to particular emergency offerings or depended on healthcare specialists for evaluation. The safety and
privateness of vitals for the duration of series and transmission is a prime concern. Therefore, it's far critical to talk
Middle East Journal of Applied Science & Technology
Vol.5, Iss.2, Pages 53-60, April-June 2022
ISSN: 2582-0974 [56] www.mejast.com
about safety strategies, concerns, and necessities in SHS. The evaluated methodologies, objectives, platforms, and
strategies are utilized in SHS. First, gift a singular type scheme for SHS that ranks their methodologies inside their
relevant domains. Second, create a type scheme for literature regarding SHS. Third, observe the maximum critical
safety assaults in SHS and the countermeasures proposed in modern literature
N.A.Azeez et al [10] have proposed that e-Health care service providers reduce the maintenance cost of data and
permit it to be present on the internet in a protective way. Attribute-Based Encryption (ABE) is used so that
privileges are assigned and collocated to numerous roles with ABE access structures. S.Mbonihankuye et al [10]
suggested that Health Insurance Portability and Accountability Act (HIPAA), is one of the possible alternatives to
health care research. A patient's database at a hospital or clinic can create a savings and analysis system to keep
patients' medical records in a well-maintained and adequate place.
3. Proposed System
Modular Encryption Standard (MES) via used because of the proposed system. The need for Health Information
protection is guided by the specification of the Integrated Delivery Network and Cluster Level Forum (as well as
compliance with Health Information confidentiality standards). Here, identity (separating criticism and HI
sensitivity) can be made. Integrated Delivery Network for medical data relies upon the MCC client’s highlighted
prerequisites. It commonly accommodates fashionable divisions, alongside the next sub-divisions. Confidential
Health Information (with high-stage security), and open/public HI. This phase gives an outline of the project that is
put forward. The procedure that has to be carried out whilst the use of MES towards making sure the HI
confidentiality in Mobile Cloud Computing.
Fig.1. Block diagram of the proposed method
Middle East Journal of Applied Science & Technology
Vol.5, Iss.2, Pages 53-60, April-June 2022
ISSN: 2582-0974 [57] www.mejast.com
4. Module Description
4.1. Memory Utilization
In this module's overall performance evaluation, one of the maximum crucial parameters is reminiscence usage.
The under graphs explain the reminiscence usage of Advanced Encryption Standard, Blowfish, Rivest Cipher 5,
Rivest Cipher 6, Data Encryption Standard, 3Data Encryption Standard, and Modular Encryption Standard. This
evaluation became achieved using the aid of the ‘‘Visual studio evaluation label’’. Modular Encryption Standard
distinctive consultation consumes 10.043 seconds in the company of reminiscence usage became as kb. Whilst
Advanced Encryption Standard it became 15.265, for Blowfish it became 10.457, for Rivest Cipher5 it became
15.342, and for Rivest Cipher6 it became 10.587.
4.2. Group Member Registration and Login
This block allows the primary user to enter his username, and password, chooses someone's institution
identification then sign up with the Data Cloud Server Group signature scheme permits any member of the
institution to signal messages even as preserving the identification mystery from verifiers. Besides, the unique
institution supervisor can monitor the identification of the signature’s originator while a dispute occurs, which is
denoted as traceability.
4.3. Key Variances Based Analysis
In this module sorts of keys or key versions of those exclusive schemes may be visible in FIGURE 16. This is a
qualitative comparative approach. Data Encryption Standard, 3Data Encryption Standard, Rivest Cipher5, Rivest
Cipher6, Blowfish, and International Data Encryption Algorithm helps the unmarried form of key, Advanced
Encryption Standard offers three styles of keys, and Modular Encryption Standard offers five exclusive sorts of
keys. Among the above-mentioned ones, the Modular Encryption Standard has the best degree of key variances.
4.4. Batch Level Sign Based Key Generation
Here every person in the organization generates the public key and personal key. The user generates a random p and
outputs a public key and personal key. Digital signatures rent a kind of uneven cryptography. For messages
dispatched thru an insecure channel, a nicely carried out virtual signature offers the receiver motive to consider the
message changed into dispatched through the claimed sender. DS is equal to a conventional inscription in lots of
respects; nicely carried out virtual signatures are greater hard to forge than the inscription type.
4.5. Key-Data Colligation Rate for Single Round
In this module commonly, every key converts statistics two times for every spherical, besides for the KW level.
Besides Key Whitening it's far 18 instances key containing records instead of 9 instances (for nine steps), as the
important thing reduction and key incrementation are the keys contain measures, demonstrates the relative research
of Rivest Cipher 5, Rivest Cipher 6, Blowfish, International Data Encryption Algorithm, Advanced Encryption
Standard, Data Encryption Standard, 3 Data Encryption Standard, and Modular Encryption Standard from the
unmarried spherical key containing factor perspective, in which Modular Encryption Standard plays conversion
two times in every spherical while contradicted.
Middle East Journal of Applied Science & Technology
Vol.5, Iss.2, Pages 53-60, April-June 2022
ISSN: 2582-0974 [58] www.mejast.com
4.6. Experimental Setup
This segment provides the MES evaluation from one-of-a-kind views within the Mobile Cloud Computing
surroundings. Modular Encryption Standards at cloud became finished using subsequent referred-to specifications.
This segment indicates the results received overall outcome evaluation in the propounded task. Our team tested the
overall outcome evaluation elements in Modular Encryption Standards comparative perspective in the company of
different not unusual place encrypting block ciphers. Table eight indicates the platform installation of the
propounded plan's overall outcome evaluation. The area complication of Modular Encryption Standards is Order of
n. The consequences are decided using the designed model. It is seen as Modular Encryption Standards having
higher overall outcome than different typically implemented set of rules in phrases of low processing unit usage
price, minimum reminiscence usage, the very best diploma of key alternatives, and maximum facts proximity price,
minimum reminiscence and processing unit usage makes a greater beneficial desire for cellular gadgets (that is
strength and assets-restricted gadgets). Because of this opposite wonderful subjective protection makes sure actions
are proven.
Fig.2. Efficiency Graph
5. Conclusion
Despite the potential answers provided with the aid of using Mobile Cloud Computing in medical document
examination, several hindrances obstructed the important thing capability of Mobile Cloud Computing. In the
middle of hurdles, protection and privateness are the important thing stumbling blocks within the usage of Mobile
Cloud Computing in medical care. Correspondingly, this study makes use of a stacked, commutable facts-oriented
cryptography method, for example, Modular Encryption Standards, that makes use of steady Health Information
sharing, and garage techniques. Relative consequences display that the project outstands different normally
incorporated techniques (specific overall outcome factors) within the Mobile Cloud Computing platform.
Currently, the method is supposed for the encrypting and decoding of facts in the form of texts, and attention to the
image-orientated facts is not provided yet. Nevertheless, in destiny paintings, this difficulty might be considered.
Middle East Journal of Applied Science & Technology
Vol.5, Iss.2, Pages 53-60, April-June 2022
ISSN: 2582-0974 [59] www.mejast.com
Layered modeling might also additionally on occasion bring about decreasing gadget performance. Accordingly,
the performance of the proposed paintings may be similarly progressed with the aid of using the combination of
quantum computing to make it extra suitable for cellular and clever devices. In the destiny, it might also
additionally make certainly affected person privateness the usage of the blockchain protection model.
Declarations
Source of Funding
This research work did not receive any grant from funding agencies in the public or not-for-profit sectors.
Competing Interests Statement
The authors declare no competing financial, professional and personal interests.
Consent for publication
Authors declare that they consented for the publication of this research work.
Authors’ Contributions
All authors equally contributed in analysis and paper drafting.
References
[1] Y. Al-Issa, M. A. Ottom, and A. Tamrawi, (2019). eHealth cloud safety demanding situations: A survey. J.
Healthcare Eng., vol. 2019, Art. no. 7516035.
[2] H. Jin, Y. Luo, P. Li, and J. Mathew, (2019). A assessment of stable and privacy preserving scientific
information sharing. IEEE Access, 7: 61656-61669.
[3] Liu, Z. Yan, W. Ding, and M. Atiquzzaman, (2019). A survey on stable information analytics in area
computing. IEEE Internet Things J., 6(3): 4946-4967.
[4] S.Chenthara, K. Ahmed, H. Wang, and F. Whittaker, ‘‘Security and privateness-maintaining demanding
situations of E-fitness answers in cloud computing,’’ IEEE Access, vol. 7, pp. 74361–74382, 2019.
[5] Algarni, (2019). A survey and type of safety and privateness studies in clever healthcare systems. IEEE Access,
7: 101879-101894.
[6] X. Wang and Z. Jin, (2019). An assessment of cellular cloud computing for pervasive healthcare. IEEE Access,
7: 66774-66791.
[7] Kavitha, K., Thamaraimanalan, T., & Kumar, M. S. (2014). An Optimized Heal Algorithm for Hole Detection
and Healing in Wireless Sensor Networks. International Journal of Advanced Engineering Research and
Technology (IJAERT), 2(7): 243-249.
[8] Iwendi, S. Ponnan, R. Munirathinam, K. Srinivasan, and C.-Y. Chang, (2019). An green and specific TF/IDF
algorithmic model-primarily based totally information evaluation for managing programs with massive
information streaming. Electronics, 8(11): 1331.
Middle East Journal of Applied Science & Technology
Vol.5, Iss.2, Pages 53-60, April-June 2022
ISSN: 2582-0974 [60] www.mejast.com
[9] Kutia, S. H. Chauhdary, C. Iwendi, L. Liu, W. Yong, and A. K. Bashir, (2019). Socio-technological elements
affecting User’s adoption of eHealth functionalities: A case observe of China and Ukraine Health systems. IEEE
Access, 7: 90777-90788.
[10] N. A. Azeez and C. V. der Vyver, (2019). Security and privateness troubles in E-fitness cloud-primarily based
totally system: A complete content material evaluation. Egyptian Informat. J., 20(2): 97-108.
[11] S Yuvaraj, M Krishnamoorthi, (2013). A novel hybrid optimization algorithm for data clustering. International
Journal of Computer Applications.
[12] Shanthi, S., Saranya, S. Rajeshkumar, R. (2014). A Survey on Anomaly Detection for Discovering Emerging
Topics. International Journal of Computer Science and Mobile Computing, 3(10): 895.
[13] An Approach For Broader Range Of Security In Cloud Computing, MS Kavitha, International Journal of
Security, Privacy and Trust Management (IJSPTM), 2(1): 43-54.

Weitere ähnliche Inhalte

Ähnlich wie Secure Data Access in Mobile Cloud Computing Using ABE Model

Information Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docxInformation Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docxannettsparrow
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...AJASTJournal
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Data Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art ReviewData Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art ReviewRida Qayyum
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
 
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREA HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREijccsa
 
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREA HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREijccsa
 
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREA HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREijccsa
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...IJCSIS Research Publications
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 

Ähnlich wie Secure Data Access in Mobile Cloud Computing Using ABE Model (20)

Information Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docxInformation Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docx
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Data Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud ComputingData Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud Computing
 
Data Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art ReviewData Security in Mobile Cloud Computing A State of the Art Review
Data Security in Mobile Cloud Computing A State of the Art Review
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
 
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREA HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
 
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREA HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
 
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREA HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
G0314043
G0314043G0314043
G0314043
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 

Mehr von Associate Professor in VSB Coimbatore

Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Associate Professor in VSB Coimbatore
 
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Associate Professor in VSB Coimbatore
 
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Associate Professor in VSB Coimbatore
 
A Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionA Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionAssociate Professor in VSB Coimbatore
 
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Associate Professor in VSB Coimbatore
 
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...Associate Professor in VSB Coimbatore
 
A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...Associate Professor in VSB Coimbatore
 
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Associate Professor in VSB Coimbatore
 
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Associate Professor in VSB Coimbatore
 
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Associate Professor in VSB Coimbatore
 
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Associate Professor in VSB Coimbatore
 
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Associate Professor in VSB Coimbatore
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal Associate Professor in VSB Coimbatore
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal Associate Professor in VSB Coimbatore
 
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Associate Professor in VSB Coimbatore
 
A Study on Sequale of Development and Clinical Features of Radicular Cyst
A Study on Sequale of Development and Clinical Features of Radicular Cyst A Study on Sequale of Development and Clinical Features of Radicular Cyst
A Study on Sequale of Development and Clinical Features of Radicular Cyst Associate Professor in VSB Coimbatore
 

Mehr von Associate Professor in VSB Coimbatore (20)

Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
 
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
 
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
 
A Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionA Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee Retention
 
Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation  Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation
 
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
 
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
 
A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...
 
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
 
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
 
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, NigeriaEcological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
 
Mass & Quark Symmetry
Mass & Quark SymmetryMass & Quark Symmetry
Mass & Quark Symmetry
 
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
 
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
 
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal
 
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
 
Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries
 
A Study on Sequale of Development and Clinical Features of Radicular Cyst
A Study on Sequale of Development and Clinical Features of Radicular Cyst A Study on Sequale of Development and Clinical Features of Radicular Cyst
A Study on Sequale of Development and Clinical Features of Radicular Cyst
 

Kürzlich hochgeladen

2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...Ayisha586983
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfalokitpathak01
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptxMel Paras
 
Introduction to Machine Learning Part1.pptx
Introduction to Machine Learning Part1.pptxIntroduction to Machine Learning Part1.pptx
Introduction to Machine Learning Part1.pptxPavan Mohan Neelamraju
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdfLivre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdfsaad175691
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...KrishnaveniKrishnara1
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxLina Kadam
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...arifengg7
 

Kürzlich hochgeladen (20)

2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdf
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx
 
Introduction to Machine Learning Part1.pptx
Introduction to Machine Learning Part1.pptxIntroduction to Machine Learning Part1.pptx
Introduction to Machine Learning Part1.pptx
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Versatile Engineering Construction Firms
Versatile Engineering Construction FirmsVersatile Engineering Construction Firms
Versatile Engineering Construction Firms
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdfLivre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptx
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
 

Secure Data Access in Mobile Cloud Computing Using ABE Model

  • 1. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [53] www.mejast.com Secure Data Access Using ABE Process Model Sasireka S1* , Priyadarseni P2 , Sanchana Sri R3 , Sushma R4 & Swathi P5 1-5 Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, India. Corresponding author email: sasireka.scse@sece.ac.in* DOI: http://doi.org/10.46431/MEJAST.2022.5207 Copyright © 2022 Sasireka S et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Article Received: 22 February 2022 Article Accepted: 27 April 2022 Article Published: 31 May 2022 1. Introduction As computing technology has hastily increased cloud computing has earned a lot of reputation in current years via packages, services, garages, and computing over the Internet. It is typically applied in lots of domain names like Medical Science, Agriculture, Business, Information Technology, and lots others. Additionally, it encourages useful resource provisioning edibility and cost-powerful decoupling administrations. Smart gadgets like smartphones and drugs are regularly becoming an essential constituent of human lifestyles as a handy and powerful device for conversation that isn't always constrained with the aid of using location and time. Smart tool customers gather wealthy enjoy of various administrations from cellular apps inclusive of Google Applications and iPhone packages that run at the faraway servers the use of wi-fi connectivity to the network. The unification of cloud computing and cellular telephones is called Mobile Cloud Computing (MCC) [6-9]. As MCC can provide some significant beets, for example, extended battery lifestyles and high-degree garage capability, scalability, adaptability, and some key needs hold on being a sign that can’t challenge MCC [11-13]. 1.1. Mobile Cloud Computing Mobile Cloud Computing (MCC) is the aggregate of cloud computing and cell computing to carry wealthy computational assets to cell customers, and community operators, in addition to cloud computing providers. The closing intention of MCC is to allow the execution of wealthy cell packages on a plethora of cell gadgets, with a wealthy person's experience. MCC affords commercial enterprise possibilities for cell community operators in addition to cloud providers. More comprehensively, MCC may be described as "a wealthy cell computing era that leverages unified elastic assets of various clouds and community technology closer to unrestricted functionality, storage, and mobility to serve a mess of cell gadgets anywhere, whenever via the channel of Ethernet or Internet irrespective of diverse platforms and systems and the cost for provided services is dependent on the use of those services. Cloud computing is the on-call for the availability of laptop machine assets, in particular records storage ABSTRACT Despite the severe and great inherited profits of Mobile Cloud Computing (MCC) in healthcare, its boom is being hindered with the aid of using privateers and protection challenges. Such problems require the utmost urgent interest to realize their complete scale and green usage. There is a want for stable health information geographically. To completely make use of the fitness services, it's far important to install vicinity the demanded protection practices for the prevention of protection breaches and vulnerabilities. Hence, this research is deliberated directly to offer requirement-orientated fitness statistics protection the use of the Modular Encryption Standard (MES) primarily established totally at the layered modeling of the safety measures. The overall performance evaluation shows that the proposed paintings excel, in comparison to different usually used algorithms towards the fitness information security on the MCC surroundings in phrases of higher overall performance and auxiliary qualitative protection ensuring measures. Keywords: Mobile cloud computing, Health information, Modular encryption standard.
  • 2. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [54] www.mejast.com (cloud storage) and computing power, without direct lively control via way of means of the person. The period is normally used to explain records facilities to be had to many customers over the Internet. Large clouds, important today, frequently have capabilities disbursed over a couple of places from relevant servers. If the relationship with the person is highly close, it can be a distinctive part server. 1.2. Requirement-Oriented Approach Considering the improvement of outcome and development process, demand is seen as unique filed bodily or useful want that a specific pattern, outcome or manner objectives to meet the expectations. This can be generally utilized with a proper experience in engineering design, together with an instance in structures engineering, software program engineering, or employer engineering. This can be seen as a huge idea that might communicate on the occasion desired function, feature, capacity, property, or best of a gadget for it to have price and application to a consumer, institution, intrinsic client, or different collaborators. Needs might include one-of-a-kind tiers of specificity; for an instance, a demand definition or need "spec" (regularly inexactly cited as "the" spec/specs, however, there are sincerely one-of-a-kind types of specifications) points to a deliberate, incredibly understandable (and regularly valued) requirement (or on occasion, a compilation of needs) to be happy through a substance, pattern, outcome. 2. Related Work The phase affords the literature study of the Health Information safety risks and methods towards making sure its privacy within the cloud. Dynamic safety and privateness dangers and threats of Mobile Cloud Computing have seemed as tremendous problems. Mobile Cloud Computing’s customers and companies are significantly dependent on their supplied resources. Numerous studies tried and answers were proposed to wait for privateness and safety challenges. Tele-tracking has been applied to remotely display the affected person’s fitness, such as scientific hubs and critical care facilities. Currently, it's far an amazing e-fitness service. By the usage of information technology, the prognosis, assessment, and remedy for the affected person are being accomplished. While appearing prognosis and remedy, getting right of entry to Electronic Health Information (EHI) is necessary. Despite the rising recognition of Electronic Health Information cloud-primarily depends totally on protection and tracking, there are various safety risks. In the middle of those risks, assault for records robbery is a key challenge. Y.Al-Issa et al [1] have proposed Cloud computing is an encouraging era this is anticipated to convert the medical enterprise. Cloud computing contains numerous advantages like affability, price and minimal use of electricity, useful resource allocating, and rapid disposal. This paper examines the usage of cloud computing inside the healthcare enterprise and exceptional cloud protection and privateer’s risks. E- centralization of facts in the cloud increases many protections and privacy issues for people and healthcare carriers, is centralization of facts gives invaders with one-prevent honey-pot to thieve facts and seize facts in movement and movements facts possession to the cloud provider carriers; therefore, the people carriers lose manipulate over touchy facts. Subsequently, protection, privateness, productivity, and flexibility issues are obstructing the magnificent acquisition of the cloud era. The located condition of the artwork answers deals with handiest a subset of these issues in this project. There may be a direct want for a comprehensive answer which stables the controverting needs.
  • 3. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [55] www.mejast.com H.Jin et al [2] have proposed in the virtual healthcare generation, that it's far of the maximum significance to harness scientific records scattered throughout healthcare establishments to guide in-intensity information evaluation and attain individualized medical hubs. Nevertheless, the cyber infrastructure obstacles of medical care corporations and privateness effusion issue region boundaries at the companioning of scientific records. Blockchain, as a common registry distinguished through its clarity, child-proof, and devolution, could assist construct in steady scientific information change community. This paper surveys the ultra-modern schemes on steady and privateness-keeping scientific information dividing of the beyond a focal point on blockchain-primarily depends on total methods. This is divided into permissionless blockchain-primarily which depends on total methods and permissions blockchain-primarily based methods and examine blessings and drawbacks. Additionally speak capacity studies subjects on blockchain-primarily based scientific information sharing. Data is an asset with value, especially these days while cloud computing, large information, and interconnection of factors are embracing every other. D.Liu et al [3] has proposed Internet of Things (IoT) is gaining growing popularity. Overwhelming volumes of records are generated through IoT devices. Those records after analytics offer considerable records that would substantially gain IoT programs. Different from conventional programs, IoT programs together with environmental monitoring, clever navigation, and clever healthcare include new necessities together with mobility, real-time response, and area awareness. However, the conventional cloud computing paradigm cannot fulfill those needs because of centralized processing and being away far from nearby devices. Hence, area computing become added to carry out records processing and garage within the fringe of networks, that's in the direction of records reasserts than cloud computing, accordingly green and area-aware. S.Chenthara et al [4] have proposed a systematic and complete evaluation of safety and privateness-retaining demanding situations in e-fitness answers showing diverse privateness retaining tactics to make certain privateness and safety of digital fitness documents (Electronic Health Records) within the cloud. The project culminates the studies demanding situations and instructions regarding cyber safety to construct a complete safety version for EHR. It conveys an in-depth look at within the IEEE, Science Direct, Google Scholar, PubMed, and ACM for papers on Electronic Health Record method posted between 2000 and 2018 and outlined them in phrases of the structure sorts in addition to assessment techniques. On examination of diverse elements of numerous reports and recognized the subsequent functions: 1) Electronic Health Records’ safety and privateness; 2) safety and privateness necessities of e-fitness information within the cloud; 3) Electronic Health Record cloud structure, and; 4) various Electronic Health Record cryptographic and non-cryptographic tactics. Additionally, a few critical troubles are spoken and the sufficient possibilities for superior studies associated with the safety and privateness of EHRs. Since huge information offers a fantastic deposit of statistics and information in telemedicine supplications, severe privateness, and safety demanding situations that require instant interest exist. Algarni et al [5] have proposed Advances in the wi-fi era have resulted within the improvement of clever healthcare systems (SHS). In SHS, sensors, wearables, and gadgets screen a patient's critical parameters. These parameters are transmitted to particular emergency offerings or depended on healthcare specialists for evaluation. The safety and privateness of vitals for the duration of series and transmission is a prime concern. Therefore, it's far critical to talk
  • 4. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [56] www.mejast.com about safety strategies, concerns, and necessities in SHS. The evaluated methodologies, objectives, platforms, and strategies are utilized in SHS. First, gift a singular type scheme for SHS that ranks their methodologies inside their relevant domains. Second, create a type scheme for literature regarding SHS. Third, observe the maximum critical safety assaults in SHS and the countermeasures proposed in modern literature N.A.Azeez et al [10] have proposed that e-Health care service providers reduce the maintenance cost of data and permit it to be present on the internet in a protective way. Attribute-Based Encryption (ABE) is used so that privileges are assigned and collocated to numerous roles with ABE access structures. S.Mbonihankuye et al [10] suggested that Health Insurance Portability and Accountability Act (HIPAA), is one of the possible alternatives to health care research. A patient's database at a hospital or clinic can create a savings and analysis system to keep patients' medical records in a well-maintained and adequate place. 3. Proposed System Modular Encryption Standard (MES) via used because of the proposed system. The need for Health Information protection is guided by the specification of the Integrated Delivery Network and Cluster Level Forum (as well as compliance with Health Information confidentiality standards). Here, identity (separating criticism and HI sensitivity) can be made. Integrated Delivery Network for medical data relies upon the MCC client’s highlighted prerequisites. It commonly accommodates fashionable divisions, alongside the next sub-divisions. Confidential Health Information (with high-stage security), and open/public HI. This phase gives an outline of the project that is put forward. The procedure that has to be carried out whilst the use of MES towards making sure the HI confidentiality in Mobile Cloud Computing. Fig.1. Block diagram of the proposed method
  • 5. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [57] www.mejast.com 4. Module Description 4.1. Memory Utilization In this module's overall performance evaluation, one of the maximum crucial parameters is reminiscence usage. The under graphs explain the reminiscence usage of Advanced Encryption Standard, Blowfish, Rivest Cipher 5, Rivest Cipher 6, Data Encryption Standard, 3Data Encryption Standard, and Modular Encryption Standard. This evaluation became achieved using the aid of the ‘‘Visual studio evaluation label’’. Modular Encryption Standard distinctive consultation consumes 10.043 seconds in the company of reminiscence usage became as kb. Whilst Advanced Encryption Standard it became 15.265, for Blowfish it became 10.457, for Rivest Cipher5 it became 15.342, and for Rivest Cipher6 it became 10.587. 4.2. Group Member Registration and Login This block allows the primary user to enter his username, and password, chooses someone's institution identification then sign up with the Data Cloud Server Group signature scheme permits any member of the institution to signal messages even as preserving the identification mystery from verifiers. Besides, the unique institution supervisor can monitor the identification of the signature’s originator while a dispute occurs, which is denoted as traceability. 4.3. Key Variances Based Analysis In this module sorts of keys or key versions of those exclusive schemes may be visible in FIGURE 16. This is a qualitative comparative approach. Data Encryption Standard, 3Data Encryption Standard, Rivest Cipher5, Rivest Cipher6, Blowfish, and International Data Encryption Algorithm helps the unmarried form of key, Advanced Encryption Standard offers three styles of keys, and Modular Encryption Standard offers five exclusive sorts of keys. Among the above-mentioned ones, the Modular Encryption Standard has the best degree of key variances. 4.4. Batch Level Sign Based Key Generation Here every person in the organization generates the public key and personal key. The user generates a random p and outputs a public key and personal key. Digital signatures rent a kind of uneven cryptography. For messages dispatched thru an insecure channel, a nicely carried out virtual signature offers the receiver motive to consider the message changed into dispatched through the claimed sender. DS is equal to a conventional inscription in lots of respects; nicely carried out virtual signatures are greater hard to forge than the inscription type. 4.5. Key-Data Colligation Rate for Single Round In this module commonly, every key converts statistics two times for every spherical, besides for the KW level. Besides Key Whitening it's far 18 instances key containing records instead of 9 instances (for nine steps), as the important thing reduction and key incrementation are the keys contain measures, demonstrates the relative research of Rivest Cipher 5, Rivest Cipher 6, Blowfish, International Data Encryption Algorithm, Advanced Encryption Standard, Data Encryption Standard, 3 Data Encryption Standard, and Modular Encryption Standard from the unmarried spherical key containing factor perspective, in which Modular Encryption Standard plays conversion two times in every spherical while contradicted.
  • 6. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [58] www.mejast.com 4.6. Experimental Setup This segment provides the MES evaluation from one-of-a-kind views within the Mobile Cloud Computing surroundings. Modular Encryption Standards at cloud became finished using subsequent referred-to specifications. This segment indicates the results received overall outcome evaluation in the propounded task. Our team tested the overall outcome evaluation elements in Modular Encryption Standards comparative perspective in the company of different not unusual place encrypting block ciphers. Table eight indicates the platform installation of the propounded plan's overall outcome evaluation. The area complication of Modular Encryption Standards is Order of n. The consequences are decided using the designed model. It is seen as Modular Encryption Standards having higher overall outcome than different typically implemented set of rules in phrases of low processing unit usage price, minimum reminiscence usage, the very best diploma of key alternatives, and maximum facts proximity price, minimum reminiscence and processing unit usage makes a greater beneficial desire for cellular gadgets (that is strength and assets-restricted gadgets). Because of this opposite wonderful subjective protection makes sure actions are proven. Fig.2. Efficiency Graph 5. Conclusion Despite the potential answers provided with the aid of using Mobile Cloud Computing in medical document examination, several hindrances obstructed the important thing capability of Mobile Cloud Computing. In the middle of hurdles, protection and privateness are the important thing stumbling blocks within the usage of Mobile Cloud Computing in medical care. Correspondingly, this study makes use of a stacked, commutable facts-oriented cryptography method, for example, Modular Encryption Standards, that makes use of steady Health Information sharing, and garage techniques. Relative consequences display that the project outstands different normally incorporated techniques (specific overall outcome factors) within the Mobile Cloud Computing platform. Currently, the method is supposed for the encrypting and decoding of facts in the form of texts, and attention to the image-orientated facts is not provided yet. Nevertheless, in destiny paintings, this difficulty might be considered.
  • 7. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [59] www.mejast.com Layered modeling might also additionally on occasion bring about decreasing gadget performance. Accordingly, the performance of the proposed paintings may be similarly progressed with the aid of using the combination of quantum computing to make it extra suitable for cellular and clever devices. In the destiny, it might also additionally make certainly affected person privateness the usage of the blockchain protection model. Declarations Source of Funding This research work did not receive any grant from funding agencies in the public or not-for-profit sectors. Competing Interests Statement The authors declare no competing financial, professional and personal interests. Consent for publication Authors declare that they consented for the publication of this research work. Authors’ Contributions All authors equally contributed in analysis and paper drafting. References [1] Y. Al-Issa, M. A. Ottom, and A. Tamrawi, (2019). eHealth cloud safety demanding situations: A survey. J. Healthcare Eng., vol. 2019, Art. no. 7516035. [2] H. Jin, Y. Luo, P. Li, and J. Mathew, (2019). A assessment of stable and privacy preserving scientific information sharing. IEEE Access, 7: 61656-61669. [3] Liu, Z. Yan, W. Ding, and M. Atiquzzaman, (2019). A survey on stable information analytics in area computing. IEEE Internet Things J., 6(3): 4946-4967. [4] S.Chenthara, K. Ahmed, H. Wang, and F. Whittaker, ‘‘Security and privateness-maintaining demanding situations of E-fitness answers in cloud computing,’’ IEEE Access, vol. 7, pp. 74361–74382, 2019. [5] Algarni, (2019). A survey and type of safety and privateness studies in clever healthcare systems. IEEE Access, 7: 101879-101894. [6] X. Wang and Z. Jin, (2019). An assessment of cellular cloud computing for pervasive healthcare. IEEE Access, 7: 66774-66791. [7] Kavitha, K., Thamaraimanalan, T., & Kumar, M. S. (2014). An Optimized Heal Algorithm for Hole Detection and Healing in Wireless Sensor Networks. International Journal of Advanced Engineering Research and Technology (IJAERT), 2(7): 243-249. [8] Iwendi, S. Ponnan, R. Munirathinam, K. Srinivasan, and C.-Y. Chang, (2019). An green and specific TF/IDF algorithmic model-primarily based totally information evaluation for managing programs with massive information streaming. Electronics, 8(11): 1331.
  • 8. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [60] www.mejast.com [9] Kutia, S. H. Chauhdary, C. Iwendi, L. Liu, W. Yong, and A. K. Bashir, (2019). Socio-technological elements affecting User’s adoption of eHealth functionalities: A case observe of China and Ukraine Health systems. IEEE Access, 7: 90777-90788. [10] N. A. Azeez and C. V. der Vyver, (2019). Security and privateness troubles in E-fitness cloud-primarily based totally system: A complete content material evaluation. Egyptian Informat. J., 20(2): 97-108. [11] S Yuvaraj, M Krishnamoorthi, (2013). A novel hybrid optimization algorithm for data clustering. International Journal of Computer Applications. [12] Shanthi, S., Saranya, S. Rajeshkumar, R. (2014). A Survey on Anomaly Detection for Discovering Emerging Topics. International Journal of Computer Science and Mobile Computing, 3(10): 895. [13] An Approach For Broader Range Of Security In Cloud Computing, MS Kavitha, International Journal of Security, Privacy and Trust Management (IJSPTM), 2(1): 43-54.