ISSN (Online) :

Special issue (unpaid ) || FAST Track Publication @@

Notice Board

Call For Paper:

Vol. 7, June, Issue 6

Paper Submission  Deadline : 30th  April 2023

Vol. 7,  Special Issue(Bi-yearly)

Fees: FREE issue 


OAIJSE Menu
Imp Links for Reviewer
Invites Proposal for

PRIVACY PROTECTIONOF ENCRYPTED MEDICAL DATA OVER MULTI-AUTHORITY CLOUD SYSTEM


Abstract

Abstract: - In the present-day cloud computing Privatesensitive data service utilization of independent and corporate needs enormouscomputational power and scalability over data storage facilities to encouragebig data utility applications power domains like insurance, public Health Care,and Research and Development areas needs to focus on Security attributes. Anelectronic insurance record or sensitive personal health record orclient-specific personal information needs to get safeguarded from another idthird party uses of the public cloud which could be done by adopting datatransformation schemes. In the domain of cloud computing in which data as aservice place a demanding situations over shared data utilization andinter-access facilities. Data access policies that are been empowered overinsensitive data are being sufficiently scaled up whereas methodologies to interactsensitive information of data providers are to be enhanced to the present day securityrequirements. So user specific sensitive information is to getprivacy-preserving by adopting effective and efficient encryption methodologiesand not encouraging limitations over data utilization strategies which brings agreat reliability and trustworthiness of personal sensitive information.Electronic health records or medical information or personal insurance policyreports or preparatory personal employee information to get maintainedfollowing high level security strategies so as to bring reliability andusability in a more wider boundaries. In order to facilitate a widescalability, attribute based encryption is been adopted facilitating authorizedmethodologies to be performed over integrated security policies in multipleauthority architectural platforms. Infocus of improvising security strategiesby adopting optimal encryption methodologies main bring a overhead are barriergates to search techniques of encrypted data formats.

Keywords:- User data privacy, Encryption,Multi-authority, Forward security, Hashing Functions, Attribute BasedEncryption


Full Text PDF
Impact Factor
Downloads
NEWS and Updates

Peer Review Process

 ICCEME -2020 conference     

Computer Science ,Electronics, Electrical  Engineering Information Technology, Civil, Computer Science and Engineering , Mechanical, Mechanical-Sandwich Petroleum, Production Instrumentation & Control, Automobile ,Chemical, Electronics Instrumentation& Control, Electronics & Telecommunication  Submit paper at oaijse@gmail.com

Organized  National Conference on SUSTAINABLE SOLID WASTE MANAGEMENT (SSWM)

@AMITY SCHOOL OF ENGINEERING & TECHNOLOGY

Department of Civil Engineering, Amity University Haryana,




Open Access License Policy

Abstracted and Indexed In