scholarly journals A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare

2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Junaid Hassan ◽  
Danish Shehzad ◽  
Insaf Ullah ◽  
Fahad Algarni ◽  
Muhammad Umar Aftab ◽  
...  

Cloud computing aims to provide reliable, customized, and quality of service (QoS) guaranteed dynamic computing environments for end-users. However, there are applications such as e-health and emergency response monitoring that require quick response and low latency. Delays caused by transferring data over the cloud can seriously affect the performance and reliability of real-time applications. Before outsourcing e-health care data to the cloud, the user needs to perform encryption on these sensitive data to ensure its confidentiality. Conventionally, any modification to the user data requires encrypting the entire data and calculating the hash of the data from scratch. This data modification mechanism increases communication and computation costs over the cloud. The distributed environment of fog computing is used to overcome the limitations of cloud computing. This paper proposed a certificate-based incremental proxy re-encryption scheme (CB-PReS) for e-health data sharing in fog computing. The proposed scheme improves the file modification operations, i.e., updation, deletion, and insertion. The proposed scheme is tested on the iFogSim simulator. The iFogSim simulator facilitates the development of models for fog and IoT environments, and it also measures the impact of resource management techniques regarding network congestion and latency. Experiments depict that the proposed scheme is better than the existing schemes based on expensive bilinear pairing and elliptic curve techniques. The proposed scheme shows significant improvement in key generation and file modification time.

2021 ◽  
Author(s):  
K Anand ◽  
A. Vijayaraj ◽  
M. Vijay Anand

Abstract The necessity of security in the cloud system increases day by day in which the data controllers harvest the rising personal and sensitive data volume.The cloud has some unprotected private data as well as data that has been outsourced for public access, which is crucial for cloud security statements. An advanced legal data protection constraint is required due to the resultant of repeated data violations. While dealing with sensitive data, most of the existing techniques failed to handle optimal privacy and different studies were performed to take on cloud privacy preservation. Hence, the novel model of privacy preservation in the cloud and artificial intelligence (AI) techniques were used to tackle these challenges. These AI methods are insight-driven, strategic, and more efficient organizations in cloud computing. However, the cost savings, agility, higher flexibility businesses are offered with cloud computing by data hosting. Data cleansing and restoration are the two major steps involved in the proposed privacy replica. In this study, we proposed Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with genetic crossover operation (CGBFO- GC) algorithm for optimal key generation. Deriving the multi-objective function parameters namely data preservation ratio, hiding ratio, and modification degree that accomplishes optimal key generation using CGBFO- GC algorithm. Ultimately, the proposed CGBFO- GC algorithm provides more efficient performance results in terms of cloud security than an existing method such as SAS-DPSO, CDNNCS, J-SSO, and GC.


2013 ◽  
Vol 10 (2) ◽  
pp. 667-684 ◽  
Author(s):  
Jianfeng Wang ◽  
Hua Ma ◽  
Qiang Tang ◽  
Jin Li ◽  
Hui Zhu ◽  
...  

As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud by users. To maintain the confidentiality of sensitive user data against untrusted servers, the data should be encrypted before they are uploaded. However, this raises a new challenge for performing search over the encrypted data efficiently. Although the existing searchable encryption schemes allow a user to search the encrypted data with confidentiality, these solutions cannot support the verifiability of searching result. We argue that a cloud server may be selfish in order to save its computation ability or bandwidth. For example, it may execute only a fraction of the search and returns part of the searching result. In this paper, we propose a new verifiable fuzzy keyword search scheme based on the symbol-tree which not only supports the fuzzy keyword search, but also enjoys the verifiability of the searching result. Through rigorous security and efficiency analysis, we show that our proposed scheme is secure under the proposed model, while correctly and efficiently realizing the verifiable fuzzy keyword search. The extensive experimental results demonstrate the efficiency of the proposed scheme.


The introduction of cloud computing has revolutionized business and technology. Cloud computing has merged technology and business creating an almost indistinguishable framework. Cloud computing has utilized various techniques that have been vital in reshaping the way computers are used in business, IT, and education. Cloud computing has replaced the distributed system of using computing resources to a centralized system where resources are easily shared between user and organizations located in different geographical locations. Traditionally the resources are usually stored and managed by a third-party, but the process is usually transparent to the user. The new technology led to the introduction of various user needs such as to search the cloud and associated databases. The development of a selection system used to search the cloud such as in the case of ELECTRE IS and Skyline; this research will develop a system that will be used to manage and determine the quality of service constraints of these new systems with regards to networked cloud computing. The method applied will mimic the various selection system in JAVA and evaluate the Quality of service for multiple cloud services. The FogTorch search tool will be used for quality service management of three cloud services.


2014 ◽  
Vol 3 (1) ◽  
Author(s):  
S. Sbrenni ◽  
A. Chiapparelli

Background: Radio Frequency Identification (RFId) technology is rapidly integrating into hospital practices to track assets, identify patients and manage personnel; it is important to assess its impact on privacy, safety and quality of health services. Objective: This paper describes the methodological approach adopted and the tools used by the authors to evaluate the quality and effectiveness of applications and systems using RFId technology in health care facilities to solve problems due to lack of traceability. Methods: To analyse the actual and/or potential effects of this technology, the method adopted is taken from the multidisciplinary approach of Health Technology Assessment (HTA), with particular reference to the assessment of quality of services provided, of safety and of protection of personal and sensitive data. Tools developed during the research include survey, verbal questioning and interviews involving hospital staff members (Management, Technical, Clinical&Service Implementation), and audit in Italian healthcare facilities. Results: We identified the current applications and technical characteristics of RFId technology and we calculated priority levels to determine impact health indicators. Results were used for evaluate the diffusion, the applications and the characteristics of RFId technology and also for calculate its impact on healthcare processes. Conclusions: Using the tools described in this paper, health managers can evaluate the impact of the RFId-based applications in their healthcare structure.


2019 ◽  
Vol 292 ◽  
pp. 03002
Author(s):  
Albert Espinal ◽  
Rebeca Estrada ◽  
Carlos Monsalve

Nowadays, the traffic over the networks is changing because of new protocols, devices and applications. Therefore, it is necessary to analyze the impact over services and resources. Traffic Classification of network is a very important prerequisite for tasks such as traffic engineering and provisioning quality of service. In this paper, we analyze the variable packet size of the traffic in an university campus network through the collected data using a novel sniffer that ensures the user data privacy. We separate the collected data by type of traffic, protocols and applications. Finally, we estimate the traffic model that represents this traffic by means of a Poisson process and compute its associated numerical parameters.


2021 ◽  
Author(s):  
Tingyun Gan ◽  
Yongjian Liao ◽  
Yikuan Liang ◽  
Zijun Zhou ◽  
Ganglin Zhang

Abstract Vehicular fog computing (VFC), combing vehicle ad hoc networks (VANET) with fog computing, is an efficient vehicle communication architecture. However, the user data is often threatened since VFC is an open environment. Attribute-based encryption (ABE) is suitable for open scenarios, such as cloud and Internet of Things (IoT), because of its confidentiality and access control characteristics. However, the traditional ABE has disadvantages, such as the inability to hide the attributes in the access policy, and the use of computationally inefficient composite order bilinear pairing groups to prove adaptive security. Traditional ABE is not practical in VFC. We summarized the existing schemes of full policy hiding ABE and partial policy hiding ABE, then concluded that partial policy hiding ABE is more suitable for VFC. We combine policy hiding technology and the technology of converting bilinear pairing cryptography schemes into prime-order bilinear pairing cryptography schemes and propose an efficient and partial policy-hiding ciphertext-policy ABE (CP-ABE) scheme suitable for VFC. Experiments have proved that our scheme is computationally more efficient than previous policy hiding ABE schemes.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 161
Author(s):  
Shakti Arora ◽  
Surjeet Dalal

Cloud computing is the becoming the architecture information technology of next generation. Cloud computing provides dynamic set of resources for different category of users. Remote access of resources is available on the pay per basis. Cloud is using the storage, computing, infrastructure services according to the requirements. Cloud manages all the user data at distributed level and provides reliability, flexibility and on demand services to user with very low cost. In Now days scenario cloud applications and data over the cloud machines are increasing day by day which indirectly invites different threats for the crucial and sensitive data on cloud. In this paper, we proposed a security model that will give the computational enhancements in different modules data. The different proposed modules: 1) key generation 2) access control strong encryption 4) remote integrity checks. The proposed model enhances t confidentiality, authentication and integrity of data. From the result analysis, it has been concluded that computation and communication overhead are minimized as compared to previous model with higher efficiency achieved.  


Author(s):  
Monjur Ahmed ◽  
Nurul I. Sarkar

Cloud computing, internet of things (IoT), edge computing, and fog computing are gaining attention as emerging research topics and computing approaches in recent years. These computing approaches are rather conceptual and contextual strategies rather than being computing technologies themselves, and in practice, they often overlap. For example, an IoT architecture may incorporate cloud computing and fog computing. Cloud computing is a significant concept in contemporary computing and being adopted in almost every means of computing. All computing architectures incorporating cloud computing are termed as cloud-based computing (CbC) in general. However, cloud computing itself is the basis of CbC because it significantly depends on resources that are remote, and the remote resources are often under third-party ownership where the privacy of sensitive data is a big concern. This chapter investigates various privacy issues associated with CbC. The data privacy issues and possible solutions within the context of cloud computing, IoT, edge computing, and fog computing are also explored.


2019 ◽  
Vol 31 (5) ◽  
pp. 324-344 ◽  
Author(s):  
Lila Rajabion ◽  
Karzan Wakil ◽  
Arshad Badfar ◽  
Mohammad Nazif ◽  
Ali Ehsani

Purpose Despite the importance of investigating the impact of cloud computing on the e-learning process, the relationship development between the two is not examined well. Thus, the main goal of this research is to assess how to improve the e-learning process by using cloud services. This paper aims to attempt to investigate the impact of cloud computing on e-learning development. Design/methodology/approach The paper is based on both quantitative and qualitative methodologies. For review-related work and statistical analysis of questionnaires, the SPSS 22 and SMART-PLS 3.2 software package are used. Findings The results from the study show that e-learning development is significantly influenced by the quality of services, cloud features, university readiness and users’ readiness. Originality/value The adoption of cloud technology within an instructional environment has the capacity of offering new opportunities for improvement and innovation for gaining knowledge of the process.


Fog computing is one of the most latest technology used by the cloud providers to safe guard the user data and service provider’s data servers. Fog computing acts as mediator between hardware and remote servers or cloud servers. Cloud computing still has the lot of vulnerabilities. Privacy to the users data is main issue in the present cloud computing. Whenever users uploads data into cloud server then user will lose their right on their own data because users don’t know about, what cloud providers do with users data, they can sell the users data for their own profit without knowing to users. Fog computing provides lot of services like operation of computer, storage and networking services between users and cloud computing data centers. With the networking services users can lose their data privacy or leakage without knowing to user. Because public clouds are not secure enough and users doesn’t know where data is storing in cloud servers. Breaking the data into small parts can lead to loss of data and which it can create way to attackers to steal data. Even data might be changed instated of one data with another. Intelligence can be applied in the fog computing technology to use of computing resources and security reasons. Applying multiple layers of security features by using kubernets can improve better service to user and user’s data can be safe from the attackers. Whenever user lost connection with the server kubernets establishes reconnection between user and server. RSA256 encryption is applied to users data with this we can provide better security between cloud server and users.


Sign in / Sign up

Export Citation Format

Share Document