M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017
Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
Nirupama Devangaon, Dr Suvarna Nandyal
Search over encrypted data is a critically important enabling technique in cloud computing, where encryption-before outsourcing is a crucial answer for ensuring user information security in the untrusted cloud server condition. In this work we focus on Role- based authentication is a combination of symmetric key cryptography and public key cryptography where by every encryption process needs Data, Public Key, Group Key, The Policy is a set of rule that can be specified as chain also for e.g., in the context of hospital a policy can be given as {doctor, patient} which means anybody from the doctors group or patient group can simultaneously decrypt the document on the other hand a policy can be specified as chain policy for instance{doctor}, {patient} This is known as nested policy.In such cases a patient can decrypt the document only when that is decrypted by doctors first, Policy based encryption is becoming popular in an enterprise context where different authorities require different permission and privacy settings for the access of the records. In this work we have develop a novel CP-ABE (Cryptography-Attributed based Encryption) based technique in an enterprise hospital context deployed in a local cloud with fog computing architecture.Our proposed system provides different level of encryption, decryption, authentication, authorization and privacy setting for doctors in the context of patients, medical image, image feature records. The data used for communication between doctor and patient is images of skin cancer and related symptoms. Both text and image is encrypted and decrypted by AES (Advanced Encryption Standard) during data transfer. Further machine learning Bayesian Classifier approach is used to diagnose abnormality in the skin cancer image. In this work we demonstrate the use of CP-ABE with human entities as well as in the context of machine learning.The overall work demonstrate the entire process of medical scanning in an enterprise hospital application both plain record encryption and image encryption with the help of CP-ABE. In order to demonstrate the efficiency of the system we have developed a simple medical application where doctor encrypt text and image which can visualize only their own patients data and the usability of machine learning image classification technique which automatically can retrieve the observation of the image as abnormal or normal. This proves machine learning and performance evaluation shows efficiency of our system.
Keywords: Cloud computing, CP-ABE, AES, Text and Image Search, Symmetric key Cryptography
Edition: Volume 6 Issue 6, June 2017
Pages: 1495 - 1500
How to Cite this Article?
Nirupama Devangaon, Dr Suvarna Nandyal, "Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20174567, Volume 6 Issue 6, June 2017, 1495 - 1500
104 PDF Views | 91 PDF Downloads
Similar Articles with Keyword 'Cloud computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
Similar Articles with Keyword 'CP-ABE'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2128 - 2130A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique
Rasal Swati A., Pawar B. V.
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2627 - 2631Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing
Kamini H. Gonnade, Fazeel Zama
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2165 - 2166Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data
Princy.B, Nishley Elizabeth Joseph
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 639 - 642A Review On Cloud Storage Architectures
Pallavi D. Dudhe, P. L. Ramteke
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Similar Articles with Keyword 'AES'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2225 - 2229A Novel Real Time Offline Patching Scheme with Secured Logging Over Cloud
Sunita, Shridevi Soma
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2084 - 2088A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections
Rupali Tanaji Waghmode, Nikita J. Kulkarni
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2073 - 2076Secure Cloud DBaaS by Client and Server side Encryption
Ashok Jayadar, A. R. Arunachalam
Similar Articles with Keyword 'Symmetric key Cryptography'
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017
Pages: 1495 - 1500Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
Nirupama Devangaon, Dr Suvarna Nandyal
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013
Pages: 105 - 108A Security Enhancing Scheme in Leach using Homomorphic Encryption
Neha Chhabra, Parikshit Singla
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 413 - 418A Study on Threats in Wireless Sensor Networks
Muruganandam. A, Bagyalakshmi. P