AN APPROACH TO SECURE MENTAL HEALTH DATA IN THE CLOUD USING END-TO-END ENCRYPTION TECHNIQUE
Journal: JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (JCET) (Vol.8, No. 5)Publication Date: 2017-10-29
Authors : S. MEENA; V. GAYATHRI;
Page : 87-98
Keywords : Cloud; Data Security; Integrity; Confidentiality; End to End Encryption; Multi-Factor Authentication; One-Time-Pad.;
Abstract
Cloud computing is a great move from the conventional system of data storage and transmission by the reason of its affordable cost, speed, global scale, productivity, performance, and reliability. Cloud has several applications in the field of education, social networking and medicine. But the advantage of cloud for medical reasons is ideal, particularly because of the huge data generated by the healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Nevertheless, the data security and privacy remain the challenging issues in the cloud data transmission. It is inevitable to concede tight security to ensure the integrity of the sensitive healthcare data which is stored and transferred through the cloud, from the attacks of tampering, hacking and intrusion. Cryptography is the practice of technique to secure communication from the third parties called opponent. In this paper, we give an approach to protect mental health data by using End to end encryption technique such as a strong encryption method which data could be in readable form to sender and receiver only, also we propose a multi factor authentication to make sure confidentiality of the data which logging is followed by a user name and password then a user is to answer a question related to the subject through the OTP (One-Time-Pad). Once authentication is verified successfully a user can allow to access the data in the encrypted form. After that, a user can decrypt the data followed by the key and can use it for their purposes. According to the experimental result the system has greatly enhanced the data integrity and confidentiality in the cloud.
Other Latest Articles
- MIXED TWO SIDED COMPLETE CHAIN SAMPLING PLANS FOR MAXIMUM ALLOWABLE VARIANCE
- INVESTIGATION OF MECHANICAL AND ELECTRICAL PROPERTIES OF KEVLAR/E-GLASS AND BASALT/E-GLASS REINFORCED HYBRID COMPOSITES
- Nurses’ strategies in prevention of nursing error recurrence in chronic critical care: A qualitative study
- EFFECT OF DIE SLEEVE MATERIAL ON MECHANICAL BEHAVIOR OF A413 ALUMINIUM ALLOY PROCESSED THROUGH SQUEEZE CASTING ROUTE
- EXPERIMENTAL INVESTIGATIONS OF EFFECT OF HEATED ABRASIVES ON ABRASIVE JET COATING REMOVAL RATE ON THE SOFT BASE MATERIALS
Last modified: 2018-09-18 14:28:51