Abstract

In addition to replacing desktop-based methods, cloud computing is playing a significant role in several areas of data management. The health care industry, where so much data is needed to be handled correctly, is another arena in which artificial intelligence has a big role to play. The upshot of this innovation led to the creation of multiple healthcare clouds. The challenge of data privacy and confidentiality is the same for different clouds. Many existing works has provided security framework to ensure the security of data in clouds but still the drawback on revocation, resisting collusion attack along with privacy of data present a complex problem. For preserving the data privacy and confidentiality, a novel framework is proposed with two novel algorithms of Threat Aware Revocation (TAR) and Advance Flexi Twister Secret Block Encryption Standard (AFT-SBES) both are named as TAR-AFT. The TAR algorithm is mainly focus on generates the user signature and the AFT-SBES algorithm to generate the key. Both the signature and key are distributed to the users for enhancing the security to access cloud storage and files. The self-session shadow approach is used to monitor the activities of the cloud users. The revocation is carried out through removal of signature from the Enhanced Dynamic Hash Table (EDHT). From the performance analysis of TAR-AFT, it provides more effective to accessing of data stored in cloud and security such as data privacy and confidentiality.

Highlights

  • The cloud computing technology is employed in various domains for data management

  • For preserving the data privacy and confidentiality, a novel framework is proposed with two novel algorithms of Threat Aware Revocation (TAR) and Advance Flexi Twister Secret Block Encryption Standard (AFTSBES) both are named as TAR-AFT

  • Algorithm 2: Digital Signature Generation Input: UID, Mk, Ap begin for each U/Oi, i € 1 to n get the security parameters from cloud setup get the User/Owner identity and attributes generate the digital signature DS Ds= twistblock(Ds) Updated Ds stored in Enhanced Dynamic Hash Table (EDHT) end for end Algorithm 3: Data Encryption

Read more

Summary

Introduction

The cloud computing technology is employed in various domains for data management. The cloud computing offers high flexibility, rapid scaling and incurs very low cost [1]. The owner data to be accessed only by authorized person [3] and the confidentiality of their data has to be managed in the health care clouds [4]. For preserving the owner privacy and their data confidentiality in the health care cloud, the novel technique proposed through the novel signature generation and key generation technique in the form of Threat Aware Revocation (TAR) and Advance Flexi Twister Secret Block Encryption Standard (AFTSBES) is being used. A novel Threat Aware Revocation (TAR) algorithm is proposed for signature generation that regulates the access of owner data in the health care cloud and the revocation is carried out through the nullifying of signature. The novel Advance Flexi Twister Secret Block Encryption Standard (AFT-SBES) algorithm is proposed to ensure the privacy and confidentiality of owner data in the cloud.

Related Works
Proposed Security Model
System Algorithms
Simulation Result
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call