ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

AN APPROACH TO SECURE MENTAL HEALTH DATA IN THE CLOUD USING END-TO-END ENCRYPTION TECHNIQUE

Journal: JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (JCET) (Vol.8, No. 5)

Publication Date:

Authors : ; ;

Page : 87-98

Keywords : Cloud; Data Security; Integrity; Confidentiality; End to End Encryption; Multi-Factor Authentication; One-Time-Pad.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing is a great move from the conventional system of data storage and transmission by the reason of its affordable cost, speed, global scale, productivity, performance, and reliability. Cloud has several applications in the field of education, social networking and medicine. But the advantage of cloud for medical reasons is ideal, particularly because of the huge data generated by the healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Nevertheless, the data security and privacy remain the challenging issues in the cloud data transmission. It is inevitable to concede tight security to ensure the integrity of the sensitive healthcare data which is stored and transferred through the cloud, from the attacks of tampering, hacking and intrusion. Cryptography is the practice of technique to secure communication from the third parties called opponent. In this paper, we give an approach to protect mental health data by using End to end encryption technique such as a strong encryption method which data could be in readable form to sender and receiver only, also we propose a multi factor authentication to make sure confidentiality of the data which logging is followed by a user name and password then a user is to answer a question related to the subject through the OTP (One-Time-Pad). Once authentication is verified successfully a user can allow to access the data in the encrypted form. After that, a user can decrypt the data followed by the key and can use it for their purposes. According to the experimental result the system has greatly enhanced the data integrity and confidentiality in the cloud.

Last modified: 2018-09-18 14:28:51