R​eview ​B​ased ​P​roject Literature Review (Secondary Research) Template Student's Name and CSU ID Abirbhav Pokhrel XXXXXXXXXX Project Type Review Based Project Name Encryption using Advanced...

1 answer below »

View more »
Answered Same DayMar 30, 2021

Answer To: R​eview ​B​ased ​P​roject Literature Review (Secondary Research) Template Student's Name and CSU ID...

Amit answered on Apr 08 2021
156 Votes
Literature Review (Secondary Research) Template
    Student Name& CSU ID
    
    Project Topic Title
    Encryption with AES for health records in hybrid cloud
    Version 1.0 _ Week 1 (5 Journal Papers from CSU Library)
    1
    Reference in APA format that will be in 'Reference List'
    Elhoseny, M., Ramírez-González, G., Abu-Elnasr, O. M., Shawkat, S. A., Arunkumar, N., & Farouk, A. (2018). Secure medical data transmission model for IoT-based healthcare systems. IEEE Access, 6, 20596-20608.
    Citation that will be in the content
    Elhoseny et al, 2018
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    https://ieeexplore.ieee.org/abstract/document/8320774
    Q1
    Encryption
Medical diagnostic imaging
Medical services
Data models
    The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
RSA, AES

Tools:
Image processing tools
Applied Area:
Healthcare area
    Problem:
The application of healthcare faces the challenges of integrity on hybrid cloud.
Goal:
To use discrete wavelet for solving the integration issues on hybrid cloud implementing healthcare database.
    2D-DWT-1L
RSA implementation,
Refined security to hybrid cloud.
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    The complete message of healthcare report is divided into two parts.
    Security is improved.
    NA
    2
    AES based public and private keys are generated.
    Authorized access is maintained.
    NA
    3
    Hashes with compressed messages are developed.
    Use of hash improves reliability.
    
    4
    Cipher is returned.
    
    
    5
    
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Processing time
    Processed data frames of hybrid cloud on every second
    Accuracy
    
    Maintenance
    
    
    
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research current solution, and Why (Justify)
        Input (Data)
    Output (View)
    Raw patient data is input.
    Secured processed data is output.
    The 2D-DWT-1L and AES provide the required security level to healthcare data.
    This research focus on both AES and 2D-DWT-1L at same time. But the implementation algorithm mainly uses AES which can cause errors in data processing.
    (Describe the research/current solution)
    Evaluation Criteria
    How this research/current solution is valuable for your project
    The current solution presented in this research is providing an effective solution to required security level in hybrid cloud for medical data. The proper processing of images is also carried out in it.
    The medical professionals can use the suggested techniques to improve and maintain the required security level while sharing reports with their patients.
    The security and image processing issues are directly solved in this paper for hybrid cloud. Thus, it is a valuable paper.
    Diagram/Flowchart
    
    2
    Reference in APA format that will be in 'Reference List'
    Le, D. N., Seth, B., & Dalal, S. (2018). A Hybrid Approach of Secret Sharing with Fragmentation and Encryption in Cloud Environment for Securing Outsourced Medical Database: A Revolutionary Approach. Journal of Cyber Security and Mobility, 7(4), 379-408.
    Citation that will be in the content
    Le, Seth & Dalal, 2018
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    https://www.riverpublishers.com/journal_read_html_article.php?j=JCSM/7/4/2
    Q3
    Cloud Computing
Healthcare
Database Outsourcing
Secret Sharing
Fragmentation
Encryption
    The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
Fragmentation
Secret sharing
AES encryption
Tools:
Trusted DBMS tools
Applied Area:
Healthcare data on cloud
    Problem:
The data outsourcing on hybrid cloud brings effective storage and great attention but medical data requires more security and that security management is main problem.
Goal:
Maintain required security levels for healthcare industry and bring advantages by fragmentation and secret sharing.
    The components are
1. Fragmentation
2. Secret sharing
3. AES encryption
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    Distributed styles are applied for creating fragmentations.
    Security is improved.
    The encryption technique is selected in last and this is based on block size, so, data breach can be created.
    2
    Decision hierarchy is developed for each data node.
    Authorized access is maintained.
    
    3
    Attribute is placed in new stake for secret sharing.
    Secret sharing becomes possible.
    
    4
    AES is applied to stake for secret sharing.
    
    
    5
    Parameter based computation on block size is performed to select best techniques.
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Algorithm selection.
    Data bits of healthcare data.
    Reliability of algorithm.
    
    Processing of secured sharing.
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research current solution, and Why (Justify)
        Input (Data)
    Output (View)
    Raw patient data is input.
    Secured sharing of data is output.
    The fragmentation, secret sharing and AES provide the required security level to healthcare data.
    This research focus on fragmentation, secret sharing and AES at same time. The encryption technique is selected in last and this is based on block size, so, data breach can be created.
    (Describe the research/current solution)
    Evaluation Criteria
    How this research/current solution is valuable for your project
    The current solution presented in this research is providing an effective solution to required security level in hybrid cloud for medical data. The proper processing of secret sharing and fragmentation is also carried out in it.
    The medical professionals can use the suggested techniques to improve and maintain the required security level while secretly sharing reports with their patients.
    The security with fragmentation and different encryption techniques are directly solved in this paper for hybrid cloud. Thus, it is a valuable paper.
    Diagram/Flowchart
    
    3
    Reference in APA format that will be in 'Reference List'
    Thilakanathan, D., Calvo, R. A., Chen, S., Nepal, S., & Glozier, N. (2016). Facilitating secure sharing of personal health data in the cloud. JMIR medical informatics, 4(2), e15.
    Citation that will be in the content
    Thilakanathan et al, 2016
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    https://medinform.jmir.org/2016/2/e15/?utm_source=TrendMD&utm_medium=cpc&utm_campaign=JMIR_TrendMD_0
    Q2
    self care; telemedicine; privacy; computer security; information dissemination
    The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution &What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
ELGAMAL encryption
Data sharing
Tools:
Hybrid cloud.
Applied Area:
Patient record management on cloud.
    Problem:
The data outsourcing on hybrid cloud brings effective storage and great attention but medical data requires more security and that security management is main problem.
Goal:
To implement required security levels for healthcare industry and bring advantages by data sharing through ELGAMAL encryption.
    The components are
1. ELGAMAL encryption
2. Data sharing
3. AES encryption
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    Patient provides user name to access application.
    Security is improved.
    The implementation of data access protocol increases the complexity in required outcome, so, processing time is also increased.
    2
    The application makes verification of credentials.
    Authorized access is maintained.
    
    3
    The CSP makes verification of required information from cloud.
    Secret sharing becomes possible.
    
    4
    Doctor verifies the information for providing advises.
    
    
    5
    Privacy among doctor and patient is maintained.
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Algorithm selection.
    Data bits of healthcare data.
    Reliability of algorithm.
    
    Processing of secured sharing.
    
    Data flow through application.
    
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research current solution, and Why (Justify)
        Input (Data)
    Output (View)
    Raw patient data is input.
    Secured sharing of data among patient and doctor..
    The ELGAMAL encryption and data sharing with AES provide the required security level to healthcare data.
    This research focus on ELGAMAL encryption and data sharing. The data flow before process is not secured.
    (Describe the research/current solution)
    Evaluation Criteria
    How this research/current solution is valuable for your project
    The current solution presented in this research is providing an effective solution to required security level in hybrid cloud for medical data. The proper processing of secret sharing and ELGAMAL encryption is also carried out in it.
    The medical professionals can use the suggested techniques to improve and maintain the required security level while secretly sharing reports with their patients.
    The security with ELGAMAL encryption and data...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30