Online ISSN: 2515-8260

Keywords : Data Sharing


PRIVACY PROTECTION AND INTRUSION AVOIDANCE FOR CLOUDLET-BASED MEDICAL DATA SHARING

European Journal of Molecular & Clinical Medicine, 2022, Volume 9, Issue 3, Pages 10771-10779

Better medical care is becoming more necessary as wearable gadgets and cloudlet technologies become in prominence. Data collection, storage, and dissemination, among other things, all fall within the purview of the medical data processing chain. In the traditional healthcare system, sensitive information about patients is often sent to the cloud, which consumes a great deal of energy and has a negative impact on the environment. In the real world, medical data exchange is a crucial and difficult subject. The versatility of the cloudlet is used to create a new healthcare system in this article. Cloudlet's features include data sharing, privacy protection, and intrusion detection. To encrypt user's body data collected by wearable devices, we use the Number Theory Research Unit (NTRU) method first. In order to save energy, this data will be sent to a neighbouring cloudlet in an efficient manner. To assist users identify trustworthy cloudlet partners, we provide a novel trust model that can be applied to the cloudlet. The trust model also facilitates communication between patients with similar illnesses. Third, we separate the medical data of patients stored in the hospital's remote cloud into three sections and safeguard them. At long last, we've developed a novel, collaborative intrusion detection system (IDS) method based on cloudlet mesh to safeguard the healthcare system's big data cloud remotely. The results of our experiments show that the proposed method is effective.

KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING BY CIPHER TEXT DATA IN THE CLOUD

M.ERAMMA,T.ABDUL RAHEEM

European Journal of Molecular & Clinical Medicine, 2017, Volume 3, Issue 6, Pages 314-319

Data sharing is a significant usefulness in distributed storage. In this article, we tell the best way to safely, proficiently, and deftly share information with others in distributed storage. We depict new open key cryptosystems which produce steady size ciphertexts with the end goal that effective appointment of decoding rights for any arrangement of ciphertexts are conceivable. The curiosity is that one can total any arrangement of mystery keys and make them as minimized as a solitary key, however including the intensity of the considerable number of keys being totaled. At the end of the day, the mystery key holder can discharge a consistent size total key for adaptable decisions of ciphertext set in distributed storage, however the other scrambled documents outside the set remain confidential. This minimized total key can be helpfully sent to others or be put away in a brilliant card with constrained secure stockpiling. We give formal security examination of our plans in the standard model. We additionally portray other utilization of our plans. Specifically, our plans give the main open key patient-controlled encryption for adaptable chain of importance, which was at this point to be known. In our cryptosystem, ciphertexts are labeled with sets of attributes and private keys are associated with access structures that control which ciphertexts a user is able to decrypt. We demonstrate the applicability of our construction to sharing of audit-log information and broadcast encryption