CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Electronic Medical Reports Security in Cloud Storage Environment based on Visual Cryptography

by Aparna Lanjekar, Apurva K. Thakur, Yaminee Koli, Jayashree Katti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 6
Year of Publication: 2017
Authors: Aparna Lanjekar, Apurva K. Thakur, Yaminee Koli, Jayashree Katti
10.5120/ijca2017915969

Aparna Lanjekar, Apurva K. Thakur, Yaminee Koli, Jayashree Katti . Electronic Medical Reports Security in Cloud Storage Environment based on Visual Cryptography. International Journal of Computer Applications. 179, 6 ( Dec 2017), 30-33. DOI=10.5120/ijca2017915969

@article{ 10.5120/ijca2017915969,
author = { Aparna Lanjekar, Apurva K. Thakur, Yaminee Koli, Jayashree Katti },
title = { Electronic Medical Reports Security in Cloud Storage Environment based on Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2017 },
volume = { 179 },
number = { 6 },
month = { Dec },
year = { 2017 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number6/28742-2017915969/ },
doi = { 10.5120/ijca2017915969 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:54:37.411141+05:30
%A Aparna Lanjekar
%A Apurva K. Thakur
%A Yaminee Koli
%A Jayashree Katti
%T Electronic Medical Reports Security in Cloud Storage Environment based on Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 6
%P 30-33
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a day’s cloud computing is the changing way to store, compute and use the data and resources which are stored on the remote servers due its properties such as it provides on demand self-service, robustness, broad network access, measured resources and low cost. But data security is a major issue that prevents users from storing files on the cloud. Every day enormous amount of data is generated in multi-specialist hospitals. This article presents various techniques to protect electronic medical reports (EMR) stored on cloud. If doctors of various specialization want to go through the reports it will be easy for them if those are placed on the cloud. This will also help patient in not carrying the prescriptions or big size reports. This article addresses these issues by proposing Visual Cryptography Scheme (VCS) and multi secret sharing for securing the multiple EMR. In order to prevent issues like breaches and malware attacks on cloud, this innovative scheme helps in high level security to safeguard the files or reports that are stored on the cloud.

References
  1. Cong Wang et al., "Ensuring data storage security in Cloud Computing", Quality of Service, 2009.
  2. Cheng TianFeiXin. “The identity authentication technology and application of gossip”. Computer Security, 2005
  3. R. Kalaichelvi, Dr. L. Arockiam, “An Innovative Solution for Cloud Security through Quantitative Analysis of Various Visual Cryptography Schemes” International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014, ISSN: 2277-3754
  4. Cheng TianFeiXin. “The identity authentication technology and application of gossip”. Computer Security, 2005
  5. Cao. N, C. Wang, M. Li, K. Ren, and W. Lou, (2011)“Privacy-preserving multi-keyword ranked search over encrypted cloud data,” in Proc. Int. Conf. Comput. Commun. (INFOCOM), pp. 829–837.
  6. Aeloor, Deepak, and Amrita A. Manjrekar. “security Biometric Data with Visual Cryptography and Steganography.” Security in Computing and Communications. Springer Berin Heidelberg,2013. 330-340
  7. M.H. Dehkordi, S. Mashhadi, “An efficient threshold verifiable multi-secret sharing”, Computer Standards and Interfaces 30,2008,56
  8. ThottempudiKiran and K. Rajani Devi “ A Review On Visual Cryptog-Raphy Schemes”, Volume 3, No. 6, June 2012 ,Journal of Global Research in Computer Science, Review Article
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Visual Cryptography Multi Secret Sharing Scheme Electronic Medical Reports (EMR).