Anzeige
Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model
Anzeige
Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model
Nächste SlideShare
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
Wird geladen in ... 3
1 von 8
Anzeige

Más contenido relacionado

Similar a Secure Data Access Using ABE Process Model (20)

Más de Associate Professor in VSB Coimbatore(20)

Anzeige

Secure Data Access Using ABE Process Model

  1. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [53] www.mejast.com Secure Data Access Using ABE Process Model Sasireka S1* , Priyadarseni P2 , Sanchana Sri R3 , Sushma R4 & Swathi P5 1-5 Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, India. Corresponding author email: sasireka.scse@sece.ac.in* DOI: http://doi.org/10.46431/MEJAST.2022.5207 Copyright © 2022 Sasireka S et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Article Received: 22 February 2022 Article Accepted: 27 April 2022 Article Published: 31 May 2022 1. Introduction As computing technology has hastily increased cloud computing has earned a lot of reputation in current years via packages, services, garages, and computing over the Internet. It is typically applied in lots of domain names like Medical Science, Agriculture, Business, Information Technology, and lots others. Additionally, it encourages useful resource provisioning edibility and cost-powerful decoupling administrations. Smart gadgets like smartphones and drugs are regularly becoming an essential constituent of human lifestyles as a handy and powerful device for conversation that isn't always constrained with the aid of using location and time. Smart tool customers gather wealthy enjoy of various administrations from cellular apps inclusive of Google Applications and iPhone packages that run at the faraway servers the use of wi-fi connectivity to the network. The unification of cloud computing and cellular telephones is called Mobile Cloud Computing (MCC) [6-9]. As MCC can provide some significant beets, for example, extended battery lifestyles and high-degree garage capability, scalability, adaptability, and some key needs hold on being a sign that can’t challenge MCC [11-13]. 1.1. Mobile Cloud Computing Mobile Cloud Computing (MCC) is the aggregate of cloud computing and cell computing to carry wealthy computational assets to cell customers, and community operators, in addition to cloud computing providers. The closing intention of MCC is to allow the execution of wealthy cell packages on a plethora of cell gadgets, with a wealthy person's experience. MCC affords commercial enterprise possibilities for cell community operators in addition to cloud providers. More comprehensively, MCC may be described as "a wealthy cell computing era that leverages unified elastic assets of various clouds and community technology closer to unrestricted functionality, storage, and mobility to serve a mess of cell gadgets anywhere, whenever via the channel of Ethernet or Internet irrespective of diverse platforms and systems and the cost for provided services is dependent on the use of those services. Cloud computing is the on-call for the availability of laptop machine assets, in particular records storage ABSTRACT Despite the severe and great inherited profits of Mobile Cloud Computing (MCC) in healthcare, its boom is being hindered with the aid of using privateers and protection challenges. Such problems require the utmost urgent interest to realize their complete scale and green usage. There is a want for stable health information geographically. To completely make use of the fitness services, it's far important to install vicinity the demanded protection practices for the prevention of protection breaches and vulnerabilities. Hence, this research is deliberated directly to offer requirement-orientated fitness statistics protection the use of the Modular Encryption Standard (MES) primarily established totally at the layered modeling of the safety measures. The overall performance evaluation shows that the proposed paintings excel, in comparison to different usually used algorithms towards the fitness information security on the MCC surroundings in phrases of higher overall performance and auxiliary qualitative protection ensuring measures. Keywords: Mobile cloud computing, Health information, Modular encryption standard.
  2. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [54] www.mejast.com (cloud storage) and computing power, without direct lively control via way of means of the person. The period is normally used to explain records facilities to be had to many customers over the Internet. Large clouds, important today, frequently have capabilities disbursed over a couple of places from relevant servers. If the relationship with the person is highly close, it can be a distinctive part server. 1.2. Requirement-Oriented Approach Considering the improvement of outcome and development process, demand is seen as unique filed bodily or useful want that a specific pattern, outcome or manner objectives to meet the expectations. This can be generally utilized with a proper experience in engineering design, together with an instance in structures engineering, software program engineering, or employer engineering. This can be seen as a huge idea that might communicate on the occasion desired function, feature, capacity, property, or best of a gadget for it to have price and application to a consumer, institution, intrinsic client, or different collaborators. Needs might include one-of-a-kind tiers of specificity; for an instance, a demand definition or need "spec" (regularly inexactly cited as "the" spec/specs, however, there are sincerely one-of-a-kind types of specifications) points to a deliberate, incredibly understandable (and regularly valued) requirement (or on occasion, a compilation of needs) to be happy through a substance, pattern, outcome. 2. Related Work The phase affords the literature study of the Health Information safety risks and methods towards making sure its privacy within the cloud. Dynamic safety and privateness dangers and threats of Mobile Cloud Computing have seemed as tremendous problems. Mobile Cloud Computing’s customers and companies are significantly dependent on their supplied resources. Numerous studies tried and answers were proposed to wait for privateness and safety challenges. Tele-tracking has been applied to remotely display the affected person’s fitness, such as scientific hubs and critical care facilities. Currently, it's far an amazing e-fitness service. By the usage of information technology, the prognosis, assessment, and remedy for the affected person are being accomplished. While appearing prognosis and remedy, getting right of entry to Electronic Health Information (EHI) is necessary. Despite the rising recognition of Electronic Health Information cloud-primarily depends totally on protection and tracking, there are various safety risks. In the middle of those risks, assault for records robbery is a key challenge. Y.Al-Issa et al [1] have proposed Cloud computing is an encouraging era this is anticipated to convert the medical enterprise. Cloud computing contains numerous advantages like affability, price and minimal use of electricity, useful resource allocating, and rapid disposal. This paper examines the usage of cloud computing inside the healthcare enterprise and exceptional cloud protection and privateer’s risks. E- centralization of facts in the cloud increases many protections and privacy issues for people and healthcare carriers, is centralization of facts gives invaders with one-prevent honey-pot to thieve facts and seize facts in movement and movements facts possession to the cloud provider carriers; therefore, the people carriers lose manipulate over touchy facts. Subsequently, protection, privateness, productivity, and flexibility issues are obstructing the magnificent acquisition of the cloud era. The located condition of the artwork answers deals with handiest a subset of these issues in this project. There may be a direct want for a comprehensive answer which stables the controverting needs.
  3. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [55] www.mejast.com H.Jin et al [2] have proposed in the virtual healthcare generation, that it's far of the maximum significance to harness scientific records scattered throughout healthcare establishments to guide in-intensity information evaluation and attain individualized medical hubs. Nevertheless, the cyber infrastructure obstacles of medical care corporations and privateness effusion issue region boundaries at the companioning of scientific records. Blockchain, as a common registry distinguished through its clarity, child-proof, and devolution, could assist construct in steady scientific information change community. This paper surveys the ultra-modern schemes on steady and privateness-keeping scientific information dividing of the beyond a focal point on blockchain-primarily depends on total methods. This is divided into permissionless blockchain-primarily which depends on total methods and permissions blockchain-primarily based methods and examine blessings and drawbacks. Additionally speak capacity studies subjects on blockchain-primarily based scientific information sharing. Data is an asset with value, especially these days while cloud computing, large information, and interconnection of factors are embracing every other. D.Liu et al [3] has proposed Internet of Things (IoT) is gaining growing popularity. Overwhelming volumes of records are generated through IoT devices. Those records after analytics offer considerable records that would substantially gain IoT programs. Different from conventional programs, IoT programs together with environmental monitoring, clever navigation, and clever healthcare include new necessities together with mobility, real-time response, and area awareness. However, the conventional cloud computing paradigm cannot fulfill those needs because of centralized processing and being away far from nearby devices. Hence, area computing become added to carry out records processing and garage within the fringe of networks, that's in the direction of records reasserts than cloud computing, accordingly green and area-aware. S.Chenthara et al [4] have proposed a systematic and complete evaluation of safety and privateness-retaining demanding situations in e-fitness answers showing diverse privateness retaining tactics to make certain privateness and safety of digital fitness documents (Electronic Health Records) within the cloud. The project culminates the studies demanding situations and instructions regarding cyber safety to construct a complete safety version for EHR. It conveys an in-depth look at within the IEEE, Science Direct, Google Scholar, PubMed, and ACM for papers on Electronic Health Record method posted between 2000 and 2018 and outlined them in phrases of the structure sorts in addition to assessment techniques. On examination of diverse elements of numerous reports and recognized the subsequent functions: 1) Electronic Health Records’ safety and privateness; 2) safety and privateness necessities of e-fitness information within the cloud; 3) Electronic Health Record cloud structure, and; 4) various Electronic Health Record cryptographic and non-cryptographic tactics. Additionally, a few critical troubles are spoken and the sufficient possibilities for superior studies associated with the safety and privateness of EHRs. Since huge information offers a fantastic deposit of statistics and information in telemedicine supplications, severe privateness, and safety demanding situations that require instant interest exist. Algarni et al [5] have proposed Advances in the wi-fi era have resulted within the improvement of clever healthcare systems (SHS). In SHS, sensors, wearables, and gadgets screen a patient's critical parameters. These parameters are transmitted to particular emergency offerings or depended on healthcare specialists for evaluation. The safety and privateness of vitals for the duration of series and transmission is a prime concern. Therefore, it's far critical to talk
  4. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [56] www.mejast.com about safety strategies, concerns, and necessities in SHS. The evaluated methodologies, objectives, platforms, and strategies are utilized in SHS. First, gift a singular type scheme for SHS that ranks their methodologies inside their relevant domains. Second, create a type scheme for literature regarding SHS. Third, observe the maximum critical safety assaults in SHS and the countermeasures proposed in modern literature N.A.Azeez et al [10] have proposed that e-Health care service providers reduce the maintenance cost of data and permit it to be present on the internet in a protective way. Attribute-Based Encryption (ABE) is used so that privileges are assigned and collocated to numerous roles with ABE access structures. S.Mbonihankuye et al [10] suggested that Health Insurance Portability and Accountability Act (HIPAA), is one of the possible alternatives to health care research. A patient's database at a hospital or clinic can create a savings and analysis system to keep patients' medical records in a well-maintained and adequate place. 3. Proposed System Modular Encryption Standard (MES) via used because of the proposed system. The need for Health Information protection is guided by the specification of the Integrated Delivery Network and Cluster Level Forum (as well as compliance with Health Information confidentiality standards). Here, identity (separating criticism and HI sensitivity) can be made. Integrated Delivery Network for medical data relies upon the MCC client’s highlighted prerequisites. It commonly accommodates fashionable divisions, alongside the next sub-divisions. Confidential Health Information (with high-stage security), and open/public HI. This phase gives an outline of the project that is put forward. The procedure that has to be carried out whilst the use of MES towards making sure the HI confidentiality in Mobile Cloud Computing. Fig.1. Block diagram of the proposed method
  5. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [57] www.mejast.com 4. Module Description 4.1. Memory Utilization In this module's overall performance evaluation, one of the maximum crucial parameters is reminiscence usage. The under graphs explain the reminiscence usage of Advanced Encryption Standard, Blowfish, Rivest Cipher 5, Rivest Cipher 6, Data Encryption Standard, 3Data Encryption Standard, and Modular Encryption Standard. This evaluation became achieved using the aid of the ‘‘Visual studio evaluation label’’. Modular Encryption Standard distinctive consultation consumes 10.043 seconds in the company of reminiscence usage became as kb. Whilst Advanced Encryption Standard it became 15.265, for Blowfish it became 10.457, for Rivest Cipher5 it became 15.342, and for Rivest Cipher6 it became 10.587. 4.2. Group Member Registration and Login This block allows the primary user to enter his username, and password, chooses someone's institution identification then sign up with the Data Cloud Server Group signature scheme permits any member of the institution to signal messages even as preserving the identification mystery from verifiers. Besides, the unique institution supervisor can monitor the identification of the signature’s originator while a dispute occurs, which is denoted as traceability. 4.3. Key Variances Based Analysis In this module sorts of keys or key versions of those exclusive schemes may be visible in FIGURE 16. This is a qualitative comparative approach. Data Encryption Standard, 3Data Encryption Standard, Rivest Cipher5, Rivest Cipher6, Blowfish, and International Data Encryption Algorithm helps the unmarried form of key, Advanced Encryption Standard offers three styles of keys, and Modular Encryption Standard offers five exclusive sorts of keys. Among the above-mentioned ones, the Modular Encryption Standard has the best degree of key variances. 4.4. Batch Level Sign Based Key Generation Here every person in the organization generates the public key and personal key. The user generates a random p and outputs a public key and personal key. Digital signatures rent a kind of uneven cryptography. For messages dispatched thru an insecure channel, a nicely carried out virtual signature offers the receiver motive to consider the message changed into dispatched through the claimed sender. DS is equal to a conventional inscription in lots of respects; nicely carried out virtual signatures are greater hard to forge than the inscription type. 4.5. Key-Data Colligation Rate for Single Round In this module commonly, every key converts statistics two times for every spherical, besides for the KW level. Besides Key Whitening it's far 18 instances key containing records instead of 9 instances (for nine steps), as the important thing reduction and key incrementation are the keys contain measures, demonstrates the relative research of Rivest Cipher 5, Rivest Cipher 6, Blowfish, International Data Encryption Algorithm, Advanced Encryption Standard, Data Encryption Standard, 3 Data Encryption Standard, and Modular Encryption Standard from the unmarried spherical key containing factor perspective, in which Modular Encryption Standard plays conversion two times in every spherical while contradicted.
  6. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [58] www.mejast.com 4.6. Experimental Setup This segment provides the MES evaluation from one-of-a-kind views within the Mobile Cloud Computing surroundings. Modular Encryption Standards at cloud became finished using subsequent referred-to specifications. This segment indicates the results received overall outcome evaluation in the propounded task. Our team tested the overall outcome evaluation elements in Modular Encryption Standards comparative perspective in the company of different not unusual place encrypting block ciphers. Table eight indicates the platform installation of the propounded plan's overall outcome evaluation. The area complication of Modular Encryption Standards is Order of n. The consequences are decided using the designed model. It is seen as Modular Encryption Standards having higher overall outcome than different typically implemented set of rules in phrases of low processing unit usage price, minimum reminiscence usage, the very best diploma of key alternatives, and maximum facts proximity price, minimum reminiscence and processing unit usage makes a greater beneficial desire for cellular gadgets (that is strength and assets-restricted gadgets). Because of this opposite wonderful subjective protection makes sure actions are proven. Fig.2. Efficiency Graph 5. Conclusion Despite the potential answers provided with the aid of using Mobile Cloud Computing in medical document examination, several hindrances obstructed the important thing capability of Mobile Cloud Computing. In the middle of hurdles, protection and privateness are the important thing stumbling blocks within the usage of Mobile Cloud Computing in medical care. Correspondingly, this study makes use of a stacked, commutable facts-oriented cryptography method, for example, Modular Encryption Standards, that makes use of steady Health Information sharing, and garage techniques. Relative consequences display that the project outstands different normally incorporated techniques (specific overall outcome factors) within the Mobile Cloud Computing platform. Currently, the method is supposed for the encrypting and decoding of facts in the form of texts, and attention to the image-orientated facts is not provided yet. Nevertheless, in destiny paintings, this difficulty might be considered.
  7. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [59] www.mejast.com Layered modeling might also additionally on occasion bring about decreasing gadget performance. Accordingly, the performance of the proposed paintings may be similarly progressed with the aid of using the combination of quantum computing to make it extra suitable for cellular and clever devices. In the destiny, it might also additionally make certainly affected person privateness the usage of the blockchain protection model. Declarations Source of Funding This research work did not receive any grant from funding agencies in the public or not-for-profit sectors. Competing Interests Statement The authors declare no competing financial, professional and personal interests. Consent for publication Authors declare that they consented for the publication of this research work. Authors’ Contributions All authors equally contributed in analysis and paper drafting. References [1] Y. Al-Issa, M. A. Ottom, and A. Tamrawi, (2019). eHealth cloud safety demanding situations: A survey. J. Healthcare Eng., vol. 2019, Art. no. 7516035. [2] H. Jin, Y. Luo, P. Li, and J. Mathew, (2019). A assessment of stable and privacy preserving scientific information sharing. IEEE Access, 7: 61656-61669. [3] Liu, Z. Yan, W. Ding, and M. Atiquzzaman, (2019). A survey on stable information analytics in area computing. IEEE Internet Things J., 6(3): 4946-4967. [4] S.Chenthara, K. Ahmed, H. Wang, and F. Whittaker, ‘‘Security and privateness-maintaining demanding situations of E-fitness answers in cloud computing,’’ IEEE Access, vol. 7, pp. 74361–74382, 2019. [5] Algarni, (2019). A survey and type of safety and privateness studies in clever healthcare systems. IEEE Access, 7: 101879-101894. [6] X. Wang and Z. Jin, (2019). An assessment of cellular cloud computing for pervasive healthcare. IEEE Access, 7: 66774-66791. [7] Kavitha, K., Thamaraimanalan, T., & Kumar, M. S. (2014). An Optimized Heal Algorithm for Hole Detection and Healing in Wireless Sensor Networks. International Journal of Advanced Engineering Research and Technology (IJAERT), 2(7): 243-249. [8] Iwendi, S. Ponnan, R. Munirathinam, K. Srinivasan, and C.-Y. Chang, (2019). An green and specific TF/IDF algorithmic model-primarily based totally information evaluation for managing programs with massive information streaming. Electronics, 8(11): 1331.
  8. Middle East Journal of Applied Science & Technology Vol.5, Iss.2, Pages 53-60, April-June 2022 ISSN: 2582-0974 [60] www.mejast.com [9] Kutia, S. H. Chauhdary, C. Iwendi, L. Liu, W. Yong, and A. K. Bashir, (2019). Socio-technological elements affecting User’s adoption of eHealth functionalities: A case observe of China and Ukraine Health systems. IEEE Access, 7: 90777-90788. [10] N. A. Azeez and C. V. der Vyver, (2019). Security and privateness troubles in E-fitness cloud-primarily based totally system: A complete content material evaluation. Egyptian Informat. J., 20(2): 97-108. [11] S Yuvaraj, M Krishnamoorthi, (2013). A novel hybrid optimization algorithm for data clustering. International Journal of Computer Applications. [12] Shanthi, S., Saranya, S. Rajeshkumar, R. (2014). A Survey on Anomaly Detection for Discovering Emerging Topics. International Journal of Computer Science and Mobile Computing, 3(10): 895. [13] An Approach For Broader Range Of Security In Cloud Computing, MS Kavitha, International Journal of Security, Privacy and Trust Management (IJSPTM), 2(1): 43-54.
Anzeige