R​eview ​B​ased ​P​roject Literature Review (Secondary Research) Template Student's Name and CSU ID Abirbhav Pokhrel XXXXXXXXXX Project Type Review Based Project Name Encryption using Advanced...

1 answer below »
all pasted


R​eview ​B​ased ​P​roject Literature Review (Secondary Research) Template Student's Name and CSU ID Abirbhav Pokhrel 11642261 Project Type Review Based Project Name Encryption using Advanced encryption standard for health records in Hybrid cloud Technolog y Hybrid Cloud Techniques Encryption using Advanced Encryption Standard Domain Health records Questions Need to be Answered How is network security, data protections, virtualization security, application integrity and identity management achieved in cloud services? How can you guarantee data protection of data while transferring data to remote server? How can hardware implementation be done to ensure security of the medical data? NOTE: Please you need to use YOUR OWN WORDS in writing this template. ● Your Literature Review Should be in Scope and MUST ​Address all Your Project's Questions ● You should ​ONLY​ use CSU library​, and Google search is ​NOT​ allowed. The papers you select should be in ​last 3 years​. If you are in 2018, then you need to collect 2018, 2017, and 2016. ● We encourage you to search for ​Journal papers​ rather than conference papers as it will give you more details. ● Check the ​Journal ranking​ (Q1, Q2)​ of the journal based on uploaded excel sheet in interact. Version 1.0 _ Week 1 (5 Journal Papers from CSU Library) 1 1 Reference in APA format that will be in 'Reference List' Babitha,M.P. & Babu Ramesh, K.R.(2016).​ ​Secure cloud storage using AES encryption Citation that will be in the content (Babitha, M., et. al., 2016) URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference https://ieeexplore.ieee.org/document/787 7709/keywords Q1 Cloud Computing AES Encryption Data security The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc ) The Goal (Objective) of this Solution & What is the Problem that need to be solved What are the components of it? Technique/Algorithm name: Secure cloud storage using AES encryption Tools: Advanced Encryption standard Applied Area: Lab Medical Hospital Problem: ​due to the multiple users and multiple users, data accessibility and privacy is very crucial. So there is a need to cloud data before encrypted. Goal: data is secured by encryption. The advanced encryption standard performed both encryption and decryption process. The main goal is to make data secure and scalable while patient centric. Cloud server Personal Health Records Personal Doctor, Family, Friends Emergency department 2 The Process (Mechanism) of this Work; The process steps of the Technique/system Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge) 1 Initially attribute is selected by owner and then provide access right in public domain. File encrypted with AES and ABS and data stored on cloud server. User request data from cloud server. After that access key is provide to emergency department by owner. Data encrypted: specific data of a patient share with doctor but others are not able to see information Security issue: the uploaded data in the cloud can be modified and tempered. 2 AES is more suitable in encryption. ABS is more expensive. So data encrypted with AES 128 key and again data decrypted with AES 128. Improved Processing time. 3 The encrypted data and encrypted data key both are stored on cloud server. Improved performance. 4 Data of patient records stored on cloud server by using AES technique. Data is more secure and private. Secured privacy 5 Validation Criteria (Measurement Criteria) Dependent Variable Independent Variable 3 Attributes Access keys Delegates Keys Encrypted data using AES Processing time Input and Output Critical Thinking: Feature of this work, and Why (Justify) Critical Thinking: Limitations of the research current solution, and Why (Justify) Input (Data) Output (View) AES encrypted data X-Ray It has Data Privacy and security of Electronic health records (EHR) on cloud server. Data hacking is the main limitation of this research. To secure unauthorized access of sensitive data, encrypted standard are used. Sometime correctness of end results such as X ray is affected by the laziness of cloud server. (Describe the research/current solution) Evaluation Criteria How this research/current solution is valuable for your project There are several cryptographic algorithm are used for encryption of data. The privacy of data is secured by using AES. These algorithms are symmetric and asymmetric. AES technique This solution is more useful in Health sector. Data privacy and security on cloud by using AES. Cloud computing is used for control, manage and access data. Diagram/Flowchart 4 Reference in APA format that will be in 'Reference List' (This give the Reference of the ​Journal Paper that the author selected and improve it (State of art of his work)​) Citation that will be in the content 2 Reference in APA format that will be in 'Reference List' Bouchti, A.E., Bahsani,S. & Nahhal,T.(2016). Encryption as a service for data healthcare cloud security. ​ ​2016 Fifth International Conference on Future Generation Communication Technologies (FGCT) Citation that will be in the content (Bouchti A., et. al.,2016) URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference https://ieeexplore.ieee.org/document/760 5072/ Q1 Data healthcare cloud security services Encryption algorithm The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc ) The Goal (Objective) of this Solution & What is the Problem that need to be solved What are the components of it? 5 https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7602797 https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7602797 Technique/Algorithm name: Encryption as a service for data healthcare cloud security Tools: Cryptography Attributes based encryption Applied Area: Health sector Problem: the main problem is privacy. Patients do not want to share data to any other accepts doctor. Goal: the main goal is data privacy and security. The heath information of patient is stored on cloud. Personal domain Public domain Cloud server Emergency staff Public health records Emergency department The Process (Mechanism) of this Work; The process steps of the Technique/system Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge) 1 Initially attributes are selected by PHR owner. Access key is provided the user by owner then file are encrypted with AES and after that data store on cloud server. Then data is access by user from cloud server. For future purpose, the access key is assigned to emergency department by PHR owner. Improved performance Security issue 6 2 AES ( Advance Encryption standard) is algorithm to encrypted and decrypt information. In encryption process, the number of rounds are: For AES128 is 10 For AES192 is 12 For AES256 is 14 Improved privacy Lengthy process 3 The functions are executed by major loop of AES. The function of AES: SubBytes() ShiftRows() MixColumns() AddRoundKey() After repeated transformation rounds, it makes data secure on cloud. Technical issues Validation Criteria (Measurement Criteria) Input and Output Critical Thinking: Feature of this work, and Why (Justify) Critical Thinking: Limitations of the research current solution, and Why (Justify) 7 Input (Data) Output (View) Encrypted data DNA It provides security and privacy to data and stored on cloud by AES technique in health sector. Data security and data privacy on cloud server are ensured through AES. In AES, The arrangement of Attribute by data. The drawback of cloud server is if the decryption key is known by anyone then data retrieved from cloud easily. So decryption key used as private key which is present for doctor who used it to get the information of patients from EHR. (Describe the research/current solution) Evaluation Criteria How this research/current solution is valuable for your project Here data is encrypted by cryptographic algorithms. These algorithms are symmetric or asymmetric. AES and DES are symmetric. Performances of these algorithms are different. Attribute based Encryption Advanced Encryption standard This research provides privacy and security to the data in heath sector. Technique may be different but data stored and accessed from cloud. Diagram/Flowchart 3 Reference in APA format that will be in 'Reference List' (This give the Reference of the ​Journal Paper you are working on it​) Fabian, B., Ermakova, T., & Junghanns, P. (2015). Collaborative and secure sharing of healthcare data in multi-clouds. Information Systems, 48, 132-150. Citation that will be in the content (Fabian, et. al.) 2015 8 URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference https://www.sciencedirect.com/science/arti cle/pii/S030643791400088X Q2 Collaborative Medical records with improved security Multi-Cloud storage The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
Answered Same DayMar 30, 2021

Answer To: R​eview ​B​ased ​P​roject Literature Review (Secondary Research) Template Student's Name and CSU ID...

Amit answered on Apr 08 2021
155 Votes
Literature Review (Secondary Research) Template
    Student Name& CSU ID
    
    Project Topic Title
    Encryption with AES for health records in hybrid cloud
    Version 1.0 _ Week 1 (5 Journal Papers from CSU Library)
    1
    Reference in APA format that will be in 'Reference List'
    Elhoseny, M., Ramírez-González, G., Abu-Elnasr, O. M., Shawkat, S. A., Arunkumar, N., & Farouk, A. (2018). Secure medical data transmission model for IoT-based healthcare systems. IEEE Access, 6, 20596-20608.
    Citation that will be in the content
    Elhoseny et al, 2018
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    https://ieeexplore.ieee.org/abstract/document/8320774
    Q1
    Encryption
Medical diagnostic imaging
Medical services
Data models
    The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
RSA, AES

Tools:
Image processing tools
Applied Area:
Healthcare area
    Problem:
The application of healthcare faces the challenges of integrity on hybrid cloud.
Goal:
To use discrete wavelet for solving the integration issues on hybrid cloud implementing healthcare database.
    2D-DWT-1L
RSA implementation,
Refined security to hybrid cloud.
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    The complete message of healthcare report is divided into two parts.
    Security is improved.
    NA
    2
    AES based public and private keys are generated.
    Authorized access is maintained.
    NA
    3
    Hashes with compressed messages are developed.
    Use of hash improves reliability.
    
    4
    Cipher is returned.
    
    
    5
    
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Processing time
    Processed data frames of hybrid cloud on every second
    Accuracy
    
    Maintenance
    
    
    
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research current solution, and Why (Justify)
        Input (Data)
    Output (View)
    Raw patient data is input.
    Secured processed data is output.
    The 2D-DWT-1L and AES provide the required security level to healthcare data.
    This research focus on both AES and 2D-DWT-1L at same time. But the implementation algorithm mainly uses AES which can cause errors in data processing.
    (Describe the research/current solution)
    Evaluation Criteria
    How this research/current solution is valuable for your project
    The current solution presented in this research is providing an effective solution to required security level in hybrid cloud for medical data. The proper processing of images is also carried out in it.
    The medical professionals can use the suggested techniques to improve and maintain the required security level while sharing reports with their patients.
    The security and image processing issues are directly solved in this paper for hybrid cloud. Thus, it is a valuable paper.
    Diagram/Flowchart
    
    2
    Reference in APA format that will be in 'Reference List'
    Le, D. N., Seth, B., & Dalal, S. (2018). A Hybrid Approach of Secret Sharing with Fragmentation and Encryption in Cloud Environment for Securing Outsourced Medical Database: A Revolutionary Approach. Journal of Cyber Security and Mobility, 7(4), 379-408.
    Citation that will be in the content
    Le, Seth & Dalal, 2018
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    https://www.riverpublishers.com/journal_read_html_article.php?j=JCSM/7/4/2
    Q3
    Cloud Computing
Healthcare
Database Outsourcing
Secret Sharing
Fragmentation
Encryption
    The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
Fragmentation
Secret sharing
AES encryption
Tools:
Trusted DBMS tools
Applied Area:
Healthcare data on cloud
    Problem:
The data outsourcing on hybrid cloud brings effective storage and great attention but medical data requires more security and that security management is main problem.
Goal:
Maintain required security levels for healthcare industry and bring advantages by fragmentation and secret sharing.
    The components are
1. Fragmentation
2. Secret sharing
3. AES encryption
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    Distributed styles are applied for creating fragmentations.
    Security is improved.
    The encryption technique is selected in last and this is based on block size, so, data breach can be created.
    2
    Decision hierarchy is developed for each data node.
    Authorized access is maintained.
    
    3
    Attribute is placed in new stake for secret sharing.
    Secret sharing becomes possible.
    
    4
    AES is applied to stake for secret sharing.
    
    
    5
    Parameter based computation on block size is performed to select best techniques.
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Algorithm selection.
    Data bits of healthcare data.
    Reliability of algorithm.
    
    Processing of secured sharing.
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research current solution, and Why (Justify)
        Input (Data)
    Output (View)
    Raw patient data is input.
    Secured sharing of data is output.
    The fragmentation, secret sharing and AES provide the required security level to healthcare data.
    This research focus on fragmentation, secret sharing and AES at same time. The encryption technique is selected in last and this is based on block size, so, data breach can be created.
    (Describe the research/current solution)
    Evaluation Criteria
    How this research/current solution is valuable for your project
    The current solution presented in this research is providing an effective solution to required security level in hybrid cloud for medical data. The proper processing of secret sharing and fragmentation is also carried out in it.
    The medical professionals can use the suggested techniques to improve and maintain the required security level while secretly sharing reports with their patients.
    The security with fragmentation and different encryption techniques are directly solved in this paper for hybrid cloud. Thus, it is a valuable paper.
    Diagram/Flowchart
    
    3
    Reference in APA format that will be in 'Reference List'
    Thilakanathan, D., Calvo, R. A., Chen, S., Nepal, S., & Glozier, N. (2016). Facilitating secure sharing of personal health data in the cloud. JMIR medical informatics, 4(2), e15.
    Citation that will be in the content
    Thilakanathan et al, 2016
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    https://medinform.jmir.org/2016/2/e15/?utm_source=TrendMD&utm_medium=cpc&utm_campaign=JMIR_TrendMD_0
    Q2
    self care; telemedicine; privacy; computer security; information dissemination
    The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution &What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
ELGAMAL encryption
Data sharing
Tools:
Hybrid cloud.
Applied Area:
Patient record management on cloud.
    Problem:
The data outsourcing on hybrid cloud brings effective storage and great attention but medical data requires more security and that security management is main problem.
Goal:
To implement required security levels for healthcare industry and bring advantages by data sharing through ELGAMAL encryption.
    The components are
1. ELGAMAL encryption
2. Data sharing
3. AES encryption
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    Patient provides user name to access application.
    Security is improved.
    The implementation of data access protocol increases the complexity in required outcome, so, processing time is also increased.
    2
    The application makes verification of credentials.
    Authorized access is maintained.
    
    3
    The CSP makes verification of required information from cloud.
    Secret sharing becomes possible.
    
    4
    Doctor verifies the information for providing advises.
    
    
    5
    Privacy among doctor and patient is maintained.
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Algorithm selection.
    Data bits of healthcare data.
    Reliability of algorithm.
    
    Processing of secured sharing.
    
    Data flow through application.
    
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research current solution, and Why (Justify)
        Input (Data)
    Output (View)
    Raw patient data is input.
    Secured sharing of data among patient and doctor..
    The ELGAMAL encryption and data sharing with AES provide the required security level to healthcare data.
    This research focus on ELGAMAL encryption and data sharing. The data flow before process is not secured.
    (Describe the research/current solution)
    Evaluation Criteria
    How this research/current solution is valuable for your project
    The current solution presented in this research is providing an effective solution to required security level in hybrid cloud for medical data. The proper processing of secret sharing and ELGAMAL encryption is also carried out in it.
    The medical professionals can use the suggested techniques to improve and maintain the required security level while secretly sharing reports with their patients.
    The security with ELGAMAL encryption and data...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here