Answer To: Review Based Project Literature Review (Secondary Research) Template Student's Name and CSU ID...
Amit answered on Apr 08 2021
Literature Review (Secondary Research) Template
Student Name& CSU ID
Project Topic Title
Encryption with AES for health records in hybrid cloud
Version 1.0 _ Week 1 (5 Journal Papers from CSU Library)
1
Reference in APA format that will be in 'Reference List'
Elhoseny, M., Ramírez-González, G., Abu-Elnasr, O. M., Shawkat, S. A., Arunkumar, N., & Farouk, A. (2018). Secure medical data transmission model for IoT-based healthcare systems. IEEE Access, 6, 20596-20608.
Citation that will be in the content
Elhoseny et al, 2018
URL of the Reference
Level of Journal (Q1, Q2, …Qn)
Keywords in this Reference
https://ieeexplore.ieee.org/abstract/document/8320774
Q1
Encryption
Medical diagnostic imaging
Medical services
Data models
The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution & What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
RSA, AES
Tools:
Image processing tools
Applied Area:
Healthcare area
Problem:
The application of healthcare faces the challenges of integrity on hybrid cloud.
Goal:
To use discrete wavelet for solving the integration issues on hybrid cloud implementing healthcare database.
2D-DWT-1L
RSA implementation,
Refined security to hybrid cloud.
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
The complete message of healthcare report is divided into two parts.
Security is improved.
NA
2
AES based public and private keys are generated.
Authorized access is maintained.
NA
3
Hashes with compressed messages are developed.
Use of hash improves reliability.
4
Cipher is returned.
5
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Processing time
Processed data frames of hybrid cloud on every second
Accuracy
Maintenance
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research current solution, and Why (Justify)
Input (Data)
Output (View)
Raw patient data is input.
Secured processed data is output.
The 2D-DWT-1L and AES provide the required security level to healthcare data.
This research focus on both AES and 2D-DWT-1L at same time. But the implementation algorithm mainly uses AES which can cause errors in data processing.
(Describe the research/current solution)
Evaluation Criteria
How this research/current solution is valuable for your project
The current solution presented in this research is providing an effective solution to required security level in hybrid cloud for medical data. The proper processing of images is also carried out in it.
The medical professionals can use the suggested techniques to improve and maintain the required security level while sharing reports with their patients.
The security and image processing issues are directly solved in this paper for hybrid cloud. Thus, it is a valuable paper.
Diagram/Flowchart
2
Reference in APA format that will be in 'Reference List'
Le, D. N., Seth, B., & Dalal, S. (2018). A Hybrid Approach of Secret Sharing with Fragmentation and Encryption in Cloud Environment for Securing Outsourced Medical Database: A Revolutionary Approach. Journal of Cyber Security and Mobility, 7(4), 379-408.
Citation that will be in the content
Le, Seth & Dalal, 2018
URL of the Reference
Level of Journal (Q1, Q2, …Qn)
Keywords in this Reference
https://www.riverpublishers.com/journal_read_html_article.php?j=JCSM/7/4/2
Q3
Cloud Computing
Healthcare
Database Outsourcing
Secret Sharing
Fragmentation
Encryption
The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution & What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Fragmentation
Secret sharing
AES encryption
Tools:
Trusted DBMS tools
Applied Area:
Healthcare data on cloud
Problem:
The data outsourcing on hybrid cloud brings effective storage and great attention but medical data requires more security and that security management is main problem.
Goal:
Maintain required security levels for healthcare industry and bring advantages by fragmentation and secret sharing.
The components are
1. Fragmentation
2. Secret sharing
3. AES encryption
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
Distributed styles are applied for creating fragmentations.
Security is improved.
The encryption technique is selected in last and this is based on block size, so, data breach can be created.
2
Decision hierarchy is developed for each data node.
Authorized access is maintained.
3
Attribute is placed in new stake for secret sharing.
Secret sharing becomes possible.
4
AES is applied to stake for secret sharing.
5
Parameter based computation on block size is performed to select best techniques.
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Algorithm selection.
Data bits of healthcare data.
Reliability of algorithm.
Processing of secured sharing.
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research current solution, and Why (Justify)
Input (Data)
Output (View)
Raw patient data is input.
Secured sharing of data is output.
The fragmentation, secret sharing and AES provide the required security level to healthcare data.
This research focus on fragmentation, secret sharing and AES at same time. The encryption technique is selected in last and this is based on block size, so, data breach can be created.
(Describe the research/current solution)
Evaluation Criteria
How this research/current solution is valuable for your project
The current solution presented in this research is providing an effective solution to required security level in hybrid cloud for medical data. The proper processing of secret sharing and fragmentation is also carried out in it.
The medical professionals can use the suggested techniques to improve and maintain the required security level while secretly sharing reports with their patients.
The security with fragmentation and different encryption techniques are directly solved in this paper for hybrid cloud. Thus, it is a valuable paper.
Diagram/Flowchart
3
Reference in APA format that will be in 'Reference List'
Thilakanathan, D., Calvo, R. A., Chen, S., Nepal, S., & Glozier, N. (2016). Facilitating secure sharing of personal health data in the cloud. JMIR medical informatics, 4(2), e15.
Citation that will be in the content
Thilakanathan et al, 2016
URL of the Reference
Level of Journal (Q1, Q2, …Qn)
Keywords in this Reference
https://medinform.jmir.org/2016/2/e15/?utm_source=TrendMD&utm_medium=cpc&utm_campaign=JMIR_TrendMD_0
Q2
self care; telemedicine; privacy; computer security; information dissemination
The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution &What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
ELGAMAL encryption
Data sharing
Tools:
Hybrid cloud.
Applied Area:
Patient record management on cloud.
Problem:
The data outsourcing on hybrid cloud brings effective storage and great attention but medical data requires more security and that security management is main problem.
Goal:
To implement required security levels for healthcare industry and bring advantages by data sharing through ELGAMAL encryption.
The components are
1. ELGAMAL encryption
2. Data sharing
3. AES encryption
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
Patient provides user name to access application.
Security is improved.
The implementation of data access protocol increases the complexity in required outcome, so, processing time is also increased.
2
The application makes verification of credentials.
Authorized access is maintained.
3
The CSP makes verification of required information from cloud.
Secret sharing becomes possible.
4
Doctor verifies the information for providing advises.
5
Privacy among doctor and patient is maintained.
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Algorithm selection.
Data bits of healthcare data.
Reliability of algorithm.
Processing of secured sharing.
Data flow through application.
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research current solution, and Why (Justify)
Input (Data)
Output (View)
Raw patient data is input.
Secured sharing of data among patient and doctor..
The ELGAMAL encryption and data sharing with AES provide the required security level to healthcare data.
This research focus on ELGAMAL encryption and data sharing. The data flow before process is not secured.
(Describe the research/current solution)
Evaluation Criteria
How this research/current solution is valuable for your project
The current solution presented in this research is providing an effective solution to required security level in hybrid cloud for medical data. The proper processing of secret sharing and ELGAMAL encryption is also carried out in it.
The medical professionals can use the suggested techniques to improve and maintain the required security level while secretly sharing reports with their patients.
The security with ELGAMAL encryption and data...