A Secure Data Transfer Approach With an Efficient Key Management Over Cloud
Author:
Affiliation:
1. Aligarh College of Engineering and Technology, Aligarh, India
2. GLA University, Mathura, India
3. Aligarh Muslim University, Aligarh, India
Abstract
The growth in the number of cloud users who transfer their health data have enhanced the importance of cloud technology's services and capabilities. However, transferring patient health data to the cloud leaves researchers with several concerns and obstacles in privacy, storage, access, key-formation, and management. The paper presents an efficient methodology for storing and accessing health information to and from the cloud. The symmetric key cryptography with the MD5 hash function is employed to enhance the framework's efficiency. The proposed method also provides secure data sharing and removes the burden of an exhaustive re-encryption computation. In the paper, two different keys are computed: one key for each legitimate user among a group and another key for the crypto-system, which is responsible to do all computations over the data. The method provides security against internal threats since only a single share of the key can be accessed. The efficiency of the model is measured by measuring the execution time for key formation, encryption, and decryption processes.
Publisher
IGI Global
Subject
General Computer Science
Reference34 articles.
1. A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds
2. An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art
3. SeDaSC: Secure Data Sharing in Clouds
4. Anam, S. Hossain, & Dahal. (2010). Review on the Advancements of DNA Cryptography. arXiv:1010.0186v[cs.CR].
5. Secure user data in cloud computing using encryption algorithms;R.Arora;International Journal of Engineering Research and Applications,2013
Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Efficient Provable Massive Data Migration Approach Under Secure Cloud Storage;Lecture Notes in Networks and Systems;2024
2. A Chunked and Disordered Data Privacy Protection Algorithm: Application to Resource Platform Systems;Applied Sciences;2023-05-13
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3