A Survey on an Efficient Technique of Encryption Scheme and its Extension in Cloud Based PHR System
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 10, Issue 6
Abstract
Scalable and secure sharing of personal health record in cloud computing is an emerging trend in Health field for exchange and the use of personal Health information. This sensitive data is shared and stored by the third party reference in cloud computing. Therefore the need of encrypting data stored at this sites is highly essential to reduce the storage space and for the cost reduction. Since, the privacy management is a complex task in the PHR management process; the issues such as risk of privacy exposure, scalability, data loss, flexible access have remained the most important task. To achieve the fine grained and scalable data access, the ABE technique and its extensions are introduced in this paper. Here the focus is done on comparing the best method for achieving the fine grained and security.
Authors and Affiliations
Prachi Dhavane , Dipak Patil
FPGA Based Design and Implementation of Image Edge Detection Using Xilinx System Generator
Edge detection serves as a pre-processing step for many image processing algorithms such as image enhancement, image segmentation, tracking and image/video coding. The edge detection is one of the key stages in image p...
ZIGBEE Operated FPGA Based Nodes in Wireless Industrial Automation Monitoring and Control
There has been a rapid growth in the extremes of Industrial Monitoring and Control, particularly in the domain of Automation processes. This is due to the extensive involvement of automation in every industry possi...
Distinction Between EMD & EEMD Algorithm for Pitch Detection in Speech Processing
In this paper we describes the different algorithms for finding pitch markers in speech signal and it also explain how EEMD is better than EMD algorithm One of the major problem in EMD algorithm is mode mixing. EEMD algo...
Design of FPGA Based Encryption Algorithm using KECCAK Hashing Functions
Security makes the people to stay in the sense of vital modern technological improvements, especially focused in Cryptography process. We have to consider the high level of security, the speed of encryption and the...
Optimizing the Cost for Resource Subscription Policy in IaaS Cloud
Cloud computing allow the users to efficiently and dynamically provision computing resource to meet their IT needs. Cloud Provider offers two subscription plan to the customer namely reservation and on-demand. The reserv...