E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption

In the present era of Information Technology, almost all big and small scale companies are moving towards cloud to store and manage the data. Cloud computing is a routine of deploying a structure of distant servers speed up on the Internet to store, oversee, and manage information, rather than a neighbourhood server or a PC. The purpose for cloud procurement is reduced cost, adaptability, regular access and refreshed programming. Nowadays, healthcare frameworks are adjusting computerized stages and ending up being more patient-centered and data driven. In this paper, we present a planning empowered intermediary re-encryption method to defeat the security issues. This Technique will allow only limited access rights to an authorized agent to access the records for a specific time period. This technique will use a searchable encryption and proxy Re-encryption technique.

[1]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[2]  Gunasekaran Manogaran,et al.  Health data analytics using scalable logistic regression with stochastic gradient descent , 2018, Int. J. Adv. Intell. Paradigms.

[3]  Jianfeng Wang,et al.  Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE , 2014, 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications.

[4]  Gunasekaran Manogaran,et al.  Disease Surveillance System for Big Climate Data Processing and Dengue Transmission , 2017, Int. J. Ambient Comput. Intell..

[5]  Ming Li,et al.  Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.

[6]  Vincenzo Iovino,et al.  Hidden-Vector Encryption with Groups of Prime Order , 2008, Pairing.

[7]  Gunasekaran Manogaran,et al.  A survey of big data architectures and machine learning algorithms in healthcare , 2017 .

[8]  Tadashi Fujita,et al.  Influences of reduced masticatory sensory input from soft-diet feeding upon spatial memory/learning ability in mice. , 2007, Biomedical research.

[9]  Sushil Jajodia,et al.  Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.

[10]  Wei Zhang,et al.  Building Intelligent Transportation Cloud Data Center Based on SOA , 2017, Int. J. Ambient Comput. Intell..

[11]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[12]  Ee-Chien Chang,et al.  Indexing Encrypted Documents for Supporting Efficient Keyword Search , 2012, Secure Data Management.

[13]  Gunasekaran Manogaran,et al.  HIoTPOT: Surveillance on IoT Devices against Recent Threats , 2018, Wirel. Pers. Commun..

[14]  Ching-Hsien Hsu,et al.  Score level based latent fingerprint enhancement and matching using SIFT feature , 2018, Multimedia Tools and Applications.

[15]  R. Varatharajan,et al.  Competent resource provisioning and distribution techniques for cloud computing environment , 2017, Cluster Computing.

[16]  Peishun Wang,et al.  An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data , 2009, WISA.

[17]  Ching-Hsien Hsu,et al.  Machine Learning Based Big Data Processing Framework for Cancer Diagnosis Using Hidden Markov Model and GM Clustering , 2017, Wireless Personal Communications.

[18]  Fan Wu,et al.  A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[19]  Daphne Lopez,et al.  Assessment of Vaccination Strategies Using Fuzzy Multi-criteria Decision Making , 2015 .

[20]  Gunasekaran Manogaran,et al.  A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system , 2017, Future Gener. Comput. Syst..

[21]  Xu An Wang,et al.  Further observation on proxy re-encryption with keyword search , 2012, J. Syst. Softw..

[22]  Brent Waters,et al.  Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.

[23]  Jiguo Li,et al.  Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage , 2017, Int. J. Commun. Syst..

[24]  Kaja Abbas,et al.  Big Data Analytics in Healthcare Internet of Things , 2017 .

[25]  Gunasekaran Manogaran,et al.  Big Data Knowledge System in Healthcare , 2017 .

[26]  Bo Zhang,et al.  An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..

[27]  Harpreet Kaur,et al.  Spatial big data analytics of influenza epidemic in Vellore, India , 2014, 2014 IEEE International Conference on Big Data (Big Data).

[28]  Gunasekaran Manogaran,et al.  A Gaussian process based big data processing framework in cluster computing environment , 2017, Cluster Computing.

[29]  Gunasekaran Manogaran,et al.  Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System , 2018 .

[30]  Gunasekaran Manogaran,et al.  Chapter 12 - Parametric Model to Predict H1N1 Influenza in Vellore District, Tamil Nadu, India , 2017 .

[31]  Xiao Zhi Gao,et al.  An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images , 2017, Comput. Electr. Eng..

[32]  Xiong Li,et al.  A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city , 2017, Future Gener. Comput. Syst..

[33]  Yun Ling,et al.  Anonymous proxy re-encryption , 2012, Secur. Commun. Networks.

[34]  Gunasekaran Manogaran,et al.  RETRACTED ARTICLE: A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing , 2017, Multimedia Tools and Applications.

[35]  Gunasekaran Manogaran,et al.  Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis , 2017, Multimedia Tools and Applications.

[36]  Gunasekaran Manogaran,et al.  Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm , 2018, Cluster Computing.

[37]  Gunasekaran Manogaran,et al.  Hybrid Recommendation System for Heart Disease Diagnosis based on Multiple Kernel Learning with Adaptive Neuro-Fuzzy Inference System , 2017, Multimedia Tools and Applications.

[38]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[39]  Naveen K. Chilamkurti,et al.  Secure Disintegration Protocol for Privacy Preserving Cloud Storage , 2018, Wirel. Pers. Commun..

[40]  Jie Wu,et al.  Time-based proxy re-encryption scheme for secure data sharing in a cloud environment , 2014, Inf. Sci..

[41]  Gunasekaran Manogaran,et al.  Modelling the H1N1 influenza using mathematical and neural network approaches , 2017 .

[42]  Ming Li,et al.  Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2014, IEEE Trans. Parallel Distributed Syst..

[43]  Dong Hoon Lee,et al.  Difference Set Attacks on Conjunctive Keyword Search Schemes , 2006, Secure Data Management.

[44]  Gunasekaran Manogaran,et al.  Spatial cumulative sum algorithm with big data analytics for climate change detection , 2017, Comput. Electr. Eng..

[45]  Ming Li,et al.  Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.

[46]  Gunasekaran Manogaran,et al.  Human-Computer Interaction With Big Data Analytics , 2018 .

[47]  Gunasekaran Manogaran,et al.  Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things , 2017, Cluster Computing.

[48]  Ying Wang,et al.  Degradation and encryption for outsourced PNG images in cloud storage , 2016, Int. J. Grid Util. Comput..

[49]  Xiong Li,et al.  Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.

[50]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[51]  D. Lopez,et al.  Climate change and disease dynamics - A big data perspective , 2016 .

[52]  Gunasekaran Manogaran,et al.  Architecture for Big Data Storage in Different Cloud Deployment Models , 2021, Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing.

[53]  Qiong Huang,et al.  A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release , 2013, ISPEC.

[54]  Xiong Li,et al.  A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments , 2018, J. Netw. Comput. Appl..

[55]  Fabrice Kordon,et al.  An approach for developing an interoperability mechanism between cloud providers , 2014, Int. J. Space Based Situated Comput..