Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal

Search over encrypted data is a critically important enabling technique in cloud computing, where encryption-before outsourcing is a crucial answer for ensuring user information security in the untrusted cloud server condition. In this work we focus on Role- based authentication is a combination of symmetric key cryptography and public key cryptography where by every encryption process needs Data, Public Key, Group Key, The Policy is a set of rule that can be specified as chain also for e.g., in the context of hospital a policy can be given as {doctor, patient} which means anybody from the doctors group or patient group can simultaneously decrypt the document on the other hand a policy can be specified as chain policy for instance{doctor}, {patient} This is known as nested policy.In such cases a patient can decrypt the document only when that is decrypted by doctors first, Policy based encryption is becoming popular in an enterprise context where different authorities require different permission and privacy settings for the access of the records. In this work we have develop a novel CP-ABE (Cryptography-Attributed based Encryption) based technique in an enterprise hospital context deployed in a local cloud with fog computing architecture.Our proposed system provides different level of encryption, decryption, authentication, authorization and privacy setting for doctors in the context of patients, medical image, image feature records. The data used for communication between doctor and patient is images of skin cancer and related symptoms. Both text and image is encrypted and decrypted by AES (Advanced Encryption Standard) during data transfer. Further machine learning Bayesian Classifier approach is used to diagnose abnormality in the skin cancer image. In this work we demonstrate the use of CP-ABE with human entities as well as in the context of machine learning.The overall work demonstrate the entire process of medical scanning in an enterprise hospital application both plain record encryption and image encryption with the help of CP-ABE. In order to demonstrate the efficiency of the system we have developed a simple medical application where doctor encrypt text and image which can visualize only their own patients data and the usability of machine learning image classification technique which automatically can retrieve the observation of the image as abnormal or normal. This proves machine learning and performance evaluation shows efficiency of our system.

Keywords: Cloud computing, CP-ABE, AES, Text and Image Search, Symmetric key Cryptography

Edition: Volume 6 Issue 6, June 2017

Pages: 1495 - 1500

Share this Article

How to Cite this Article?

Nirupama Devangaon, Dr Suvarna Nandyal, "Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20174567, Volume 6 Issue 6, June 2017, 1495 - 1500

104 PDF Views | 91 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Similar Articles with Keyword 'CP-ABE'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2128 - 2130

A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique

Rasal Swati A., Pawar B. V.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2627 - 2631

Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing

Kamini H. Gonnade, Fazeel Zama

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2165 - 2166

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Princy.B, Nishley Elizabeth Joseph

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 639 - 642

A Review On Cloud Storage Architectures

Pallavi D. Dudhe, P. L. Ramteke

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Similar Articles with Keyword 'AES'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2225 - 2229

A Novel Real Time Offline Patching Scheme with Secured Logging Over Cloud

Sunita, Shridevi Soma

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2084 - 2088

A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections

Rupali Tanaji Waghmode, Nikita J. Kulkarni

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2073 - 2076

Secure Cloud DBaaS by Client and Server side Encryption

Ashok Jayadar, A. R. Arunachalam

Share this Article

Similar Articles with Keyword 'Symmetric key Cryptography'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1495 - 1500

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 105 - 108

A Security Enhancing Scheme in Leach using Homomorphic Encryption

Neha Chhabra, Parikshit Singla

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 413 - 418

A Study on Threats in Wireless Sensor Networks

Muruganandam. A, Bagyalakshmi. P

Share this Article
Top