Answer To: Sample 1_Augmented Reality Reference in APA format Penza, V., Ortiz, J., Mattos, L. S., Forgione,...
Amit answered on Aug 14 2020
cloud computing with AES encryption for Health sector
(
18
cloud
computing with AES encryption for Health sector
)
Table of contents
1) Journal 1
2) Journal 2
3) Journal3
4) Journal 4
5) Journal 5
6) Journal 6
7) Journal 7
8) Journal 8
9) Journal 9
10) Journal 10
11) Journal 11
12) Journal12
13) Journal 13
14) Journal 14
15) Journal15
16) Journal 16
17) Journal 17
18) Journal 18
19) Journal 19
20) Journal 20
Version 1.0 _ Week 1 (5 Journal Papers from CSU Library)
1.
Reference in APA format that will be in 'Reference List'
Babitha,M.P. & Babu Ramesh, K.R.(2016). Secure cloud storage using AES encryption
Citation that will be in the content
URL of the Reference
Level of Journal (Q1, Q2, …Qn)
Keywords in this Reference
https://ieeexplore.ieee.org/document/7877709/keywords
Q1
Cloud Computing
AES Encryption
Data security
The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution & What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Secure cloud storage using AES encryption
Tools:
Advanced Encryption standard
Applied Area:
Lab
Medical
Hospital
Problem: due to the multiple users and multiple user, data accessibility and privacy is very crucial. So there is a need to cloud data before encrypted.
Goal: data is secured by encryption. The advanced encryption standard performed both encryption and decryption process. The main goal is to make data secure and scalable while patient centric.
Cloud server
Personal Health Records
Personal Doctor, Family, Friends
Emergency department
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
Initially attribute is selected by owner and then provide access right in public domain. File encrypted with AES and ABS and data stored on cloud server. User request data from cloud server. After that access key is provide to emergency department by owner.
Data encrypted: specific data of a patient share with doctor but others are not able to see information
Security issue: the uploaded data in the cloud can be modified and tempered.
2
AES is more suitable in encryption. ABS is more expensive. So data encrypted with AES 128 key and again data decrypted with AES 128.
Improved Processing time.
3
The encrypted data and encrypted data key both are stored on cloud server.
Improved performance.
4
Data of patient records stored on cloud server by using AES technique. Data is more secure and privte.
Secured privacy
5
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Attributes
Access keys
Delegates Keys
Encrypted data using AES
Processing time
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research current solution, and Why (Justify)
Input (Data)
Output (View)
AES encrypted data
X-RAy
It have Data Privacy and security of Electronic health records(EHR) on cloud server.
Data hacking is the main limitation of this research.
(Describe the research/current solution)
Evaluation Criteria
How this research/current solution is valuable for your project
There are several cryptographic algorithm are used for encryption of data. The privacy of data is secured by using AES. These algorithms are symmetric and asymmetric.
AES technique
This solution is more useful in Health sector. Data privacy and security on cloud by using AES. Cloud computing is used for control, manage and access data.
Diagram/Flowchart
2.
Reference in APA format that will be in 'Reference List'
Bouchti, A.E., Bahsani,S. & Nahhal,T.(2016). Encryption as a service for data healthcare cloud security. 2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)
Citation that will be in the content
Bouchti,2016
URL of the Reference
Level of Journal (Q1, Q2, …Qn)
Keywords in this Reference
https://ieeexplore.ieee.org/document/7605072/
Q1
Data healthcare cloud security services
Encryption algorithm
The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution & What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Encryption as a service for data healthcare cloud security
Tools:
Cryptography
Attributes based encryption
Applied Area:
Health sector
Problem: the main problem is privacy. Patients do not want to share data to any other accepts doctor.
Goal: the main goal is data privacy and security. The heath information of patient is stored on cloud.
Personal domain
Public domain
Cloud server
Emergency staff
Public health records
Emergency department
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
Initially attributes are selected by PHR owner. Access key is provided the user by owner then file are encrypted with AES and after that data store on cloud server. Then data is access by user from cloud server. For future purpose, the access key is assigned to emergency department by PHR owner.
Improved performance
Security issue
2
AES(Advance Encryption standarad) is algorithm to encrypted and decrypt information. In encryption process, the number of rounds are:
For AES128 is 10
ForAES192 is 12
For AES256 is 14
Improved privacy
Lengthy process
3
The functions are executed by major loop of AES. The function of AES:
SubBytes()
ShiftRows()
MixColumns()
AddRoundKey()
After repeated transformation rounds, it makes data secure on cloud.
Technical issues
4
5
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Attributes
Access keys
Data request from cloud
Data access from cloud
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research current solution, and Why (Justify)
Input (Data)
Output (View)
Encrypted data
DNA
It provides security and privacy to data and stored on cloud by AES technique in health sector.
Data security and data privacy
(Describe the research/current solution)
Evaluation Criteria
How this research/current solution is valuable for your project
Here data is encrypted by cryptographic algorithms. These algorithms are symmetric or asymmetric. AES and DES are symmetric. Performances of these algorithms are different.
Attribute based Encryption
Advanced Encryption standard
This research provides privacy and security to the data in heath sector. Technique may be different but data stored and accessed from cloud.
Diagram/Flowchart
3.
Reference in APA format that will be in 'Reference List'
Josephius Arunkumar,R. & Anbuselvi, R.(2017). Eahancement of cloud computing security in healthcare sector. IJCSMC, Vol. 6, Issue. 8, August 2017, pg.23 – 31
Citation that will be in the content
Josephius,2017
URL of the Reference
Level of Journal (Q1, Q2, …An)
Keywords in this Reference
https://www.ijcsmc.com/docs/papers/August2017/V6I8201705.pdf
Q2
Electronic Health record
Cloud environment
The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution &What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name: Eahancement of cloud computing security in healthcare sector
Tools: AES
Applied Area:
Patients Health
Hospital
Problem: the problem of data privacy and data security. Now data is centralised due to cloud computing technology.
Goal: the key facility of cloud computing provide the security to data. Three main points are covered by data security’s goal: Integrity, availability and confidentially.
Electronic Health record
Data owner
Data user
Encrypted data
Cloud storage
Sequence key
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
Cloud computing architecture divided into two sections: back end and front end. Client application and computer comprises in front end. Server and data storage at back end. Network computer communicates each other through middleware and protocols.
Reduced cost
Security issues
2
Patient complete healthcare report stored on cloud computing. Some private data stored in image form. For extra care image converted into pixels and encrypted into pixels.
Improved performance
Technical issues
3
Encryption is done through technique advance encryption standard (AES). Cryptography is important method to secure data on cloud
Increased processing time
4
Symmetric and asymmetric algorithm is providing by cryptography to secure data.
Provide privacy
5
Symmetric cryptography algorithm is known as AES.
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Hybrid cloud
Central server
Protocols
Data encryption
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research current solution, and Why (Justify)
Input (Data)
Output (View)
3D Model
CT Scan
Feature of this work is mainly provided security and privacy to the data which is related to patients’ health and stored that data on cloud.
There is a chance of data hacking in this research current solution. This is limitation of it.
(Describe the research/current solution)
Evaluation Criteria
How this research/current solution is valuable for your project
Cloud service models include platform as a service, software as a service and infrastructure as a service. There is no need of direct communication for health records’ transfers.
Technique:AES
The importance of this research to encrypting important data and centralized data in heath sector.
Diagram/Flowchart
4.
Reference in APA format that will be in 'Reference List'
Luxton, D. D., Kayl, R. A., & Mishkind, M. C. (2012). mHealth data security: The need for HIPAA-compliant standardization. Telemedicine and e-Health, 18(4), 284-288.
Citation that will be in the content
Luxton, 2012
URL of the Reference
Level of Journal (Q1, Q2, …An)
Keywords in this Reference
https://www.liebertpub.com/doi/abs/10.1089/tmj.2011.0180
Q2
mHealth record
HIPPA
The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution &What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name: Eahancement the security of health record by making use of HIPPA
Tools: HIPPA
Applied Area:
mPatients Health
Health insurance
Problem: The use of wireless devices can cause data privacy issues. The implementation of HIPPA with cloud can solve this issue.
Goal: The security of wireless devices used on cloud is main goal. For archiving this goal HIPPA is being implemented.
mHealth record
HIPPA
Security requirements in wireless cloud storage
Sequence key
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
Cloud computing architecture can be used on wireless mobile devices for accessing the health care records. The cloud services can be used for storing and accessing the records. Network mobile device communicates each other through middleware and protocols.
Reduced data accessing cost
Security issues to mdata
2
Complete records of healthcare report stored on cloud computing. Encryption is implemented on cloud stored data.
Overall performance is increased
Technical issues
3
The advance encryption standard (AES) and HIPPA are used for mobile data encryption. HIPPA is providing support to AES.
Increased processing time
4
For secure mdata HIPPA is best solution to cloud.
Provide improved security
5
Cloud data access on mobile devices is known as mdata.
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Mobile devices
mdata
HIPPA
Data encryption
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research current solution, and Why (Justify)
Input (Data)
Output (View)
3D Model
Secured data on wireless devices
The implementation of HIPPA provides additional security to hybrid cloud which increases the overall security of mdata.
The increased cost due to implementation of HIPPA is its limitation.
(Describe the research/current solution)
Evaluation Criteria
How this research/current solution is valuable for your project
The hybrid Cloud service models include HIPPA and mobile data on wireless devices. The patient records can be accessed from any wireless devices at anywhere.
Technique: AES and HIPPA
The importance of this research to implement HIPPA to increase security of mobile data of health care area stored on hybrid cloud.
Diagram/Flowchart
5.
Reference in APA format that will be in 'Reference List'
Yang, J. J., Li, J. Q., & Niu, Y. (2015). A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems, 43, 74-86..
Citation that will be in the content
Yang, 2015
URL of the Reference
Level of Journal (Q1, Q2, …An)
Keywords in this Reference
https://www.sciencedirect.com/science/article/pii/S0167739X14001253
Q2
Medical records
Cloud storage
The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution &What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name: Eahancement the security of medical records by making use of integrity check.
Tools: AES
Applied Area:
Medical records
Data sharing for medical records
Problem: The use of hybrid cloud for sharing the medical records can cause data privacy issues. The implementation of cryptography with cloud can solve this issue.
Goal: The security of medical data stored on hybrid cloud is main goal. For archiving this goal encryption is being implemented.
Medical records
Integrity checks
Security requirements on hybrid cloud for medical records
Statistical analysis
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
The policy, privacy statics and privacy cryptography are the main process steps for implementing Cloud computing architecture and encryption protocols on health care records.
Reduced operational cost
Security issues to health care databases stored on hybrid cloud.
2
Complete records of healthcare report are merged and integrity checks are carried out.
Overall performance is increased
Technical issues
3
The hybrid search of plan text in cipher text is completed.
Increased data accessing time.
4
A protocol based system for improved security on medical data is implemented.
Provide improved security
5
An effective extensive experiment is carried out.
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Hybrid cloud
Health care data.
integrity checks
Data encryption
Protocol based system implementation
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research current solution, and Why (Justify)
Input (Data)
Output (View)
Health care data for merging on hybrid cloud.
Protocol based secured data as output.
The implementation of protocol based system on hybrid cloud for medical databases provides additional security to hybrid cloud which increases the overall security of medical data.
The implementation cost is increased due to implementation of protocol based system, is its limitation.
(Describe the research/current solution)
Evaluation Criteria
How this research/current solution is valuable for your project
The hybrid Cloud service models include protocol based system and merged health care data on hybrid cloud. The patient records can be accessed by providing the decryption key only.
Technique: AES
The importance of this research to implement protocol based system to increase security of health care data stored on hybrid cloud.
Diagram/Flowchart
6.
Reference in APA format that will be in 'Reference List'
Fabian, B., Ermakova, T., & Junghanns, P. (2015). Collaborative and secure sharing of healthcare data in multi-clouds. Information Systems, 48, 132-150.
Citation that will be in the content
Fabian, 2015
URL of the Reference
Level of Journal (Q1, Q2, …An)
Keywords in this Reference
https://www.sciencedirect.com/science/article/pii/S030643791400088X
Q2
Collaborative Medical records with improved security
Multi-Cloud storage
The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution &What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name: Eahancement the security of medical records by implementation of big data with multi-cloud storage.
Tools: AES
Applied Area:
Big data
Multi-cloud for health records.
Problem: The use of multi-cloud for implementing big data on the medical records can cause data privacy issues. The implementation of cryptography on big data and multi-cloud can solve this issue.
Goal: The security of medical data stored on big data and multi-cloud is main goal. For archiving this goal encryption is being implemented.
Medical records
Big data
Secret sharing of health care records
Multi-cloud
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
The big data like HADOOP is implemented on multi-clouds for storing health care records.
Improves data storage capabilities.
Security issues to health care databases stored on multi-clouds and big data.
2
Complete records of healthcare report are placed on big data and integrity checks on multi-clouds are carried out.
Overall performance is increased
3
Architecture for big data sharing for improved security is implemented.
Increased data accessing time.
4
A secret sharing system for improved security on medical data is implemented.
Provide improved security
5
A demonstration of physical feasibility is carried out.
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Multi-cloud
Health care data.
Big data
Secret sharing
Data encryption architecture on big data
Architecture based system implementation
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research current solution, and Why (Justify)
Input (Data)
Output (View)
Health care data on big data and multi-clouds.
Architecture based secured data as output.
The implementation of architecture based system on multi-cloud...