A secure indexing method for privacy- preserving keyword search
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
E-healthcare systems are ever trendier, a large amount of private data for medical principle is occupied, and populace start to appreciate that they would entirely lose organize over their individual information once it come into the cyberspace. According to the government website roughly 8 million patients’ health in order was reveal in the past two years. There are superior reasons for trust medical data private and restraining the access. An employer may settle on not to take on someone with sure diseases. An insurance company may decline to give life insurance knowing the disease history of a patient. In spite of the supreme significance, privacy issues are not speak to sufficiently at the technological level and efforts to keep health data locked have often descend short. This is since protecting privacy in the cyberspace is radically more testing. Thus, there is an imperative need for the increase of workable protocols, architectures, and systems declare time alone and security to safeguard responsive and personal digital information.
Authors and Affiliations
M. Leena, P. V. G. K. Jagannadha Raju
Side-Channel Passive Attacks Implementation to Cryptographic Hardware Using FPGA
This paper dealt with an FPGA based test bed used for injecting faults through clock glitches, to result in setup and hold violations. The UART interface is realized on FPGA to provide PC based controlling for this f...
FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL
In this paper investigate the problem of discovering the set of troublesome rules in a large firewall policy and consequently eliminating or resolving them. all the rules in the policy are consistent and can be reord...
A Novel Survey on SLA based Load leveling in Cloud Computing
The provision of Virtual Machines (VMs) in cloud is one major concern of cloud computing. Cloud Computing is nothing however a group of computing resources and services pooled along and is provided to the users on pay...
An Effective Approach Of Compressing Encrypted Images
In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a s...
An Effective Scheme for Countering Distributed Denial of Service Attacks on Mobile Ad-hoc Networks
Mobile ad hoc networks play a key role in the private and public communication, yet their application is being hampered by network attacks. One of the most dangerous attacks that pose a serious threat to the mobile a...