LITERATURE REVIEW TEMPLATE
NOTE: Please Use (Grammar Check) Link in Left Side Bar Interact to check the Grammar of Your Final Report Before Submitting it
Your Literature Review Assignment should have the following sections:
Abstract: (altogether ~250 words)
Give a
ief overview of the aims, methods and expected findings of your work, and your contribution in this project. Write each of these points as small paragraph.
1. Introduction: (altogether 500~600 words)
Give a definition of the topic you are researching (a description, an argument or a proposal)
· Tell your reader which area of the related literature you are going to research (what is interesting here: for example, you are researching the literature on tertiary students)
· Tell your reader which area of the related literature you are NOT going to research (i.e. ‘students’ does not mean primary and secondary students – you are not researching the literature on those)
· State the general findings (what do most sources conclude).
2. Literature Review: (~ XXXXXXXXXXwords = (600~700 all Literature + 700~800 State of Art (First Best Solution))
Describe the field of research and show your reader how you will organise your research (in sections with headings)
2.1 Write your reviews, using the following guide: Describe the research + evaluate the contribution the work makes to the field + limitations of the research + How is it valuable for your project
Clarification of (2.1):
For each author_ you need to write a paragraph that has the following 4 steps:
(1) What he has done (what is the fundamental step of his work), How he has done this fundamental step (Which algorithm/technique/method that the author used to achieve this fundamental step), What is the result the author got using this algorithm/technique/method; Describe the research.
(2) What is the important thing of what he has done, and JUSTIFY why it is important (Show how much the author improved compared with cu
ent solution; evaluate the contribution the work makes to the field.
(3) What is the limitations of what he has done , and why this work has got this limitations (JUSTIFY); limitations of the research.
(4) Then you need to assess this work how it will be useful in your project to improve ; How is it valuable for your project
Sample review (look at the colours – they match the descriptions above):
Gu et al XXXXXXXXXXinvestigated the impact of noise on the clarity of pictures in facial recognition procedures. They offer a solution to the problem by combining two algorithms, leading to 78% clarity. Whilst this is an improvement over the cu
ent solution of 72%, the noise level is still unacceptably high. It would, therefore, seem that the combination of algorithms does not offer further possibilities for improvement. Linking word
Further algorithm-based research …
2.2 Describe the first cu
ent best selected solution ; discuss the most important features; justify why you
think it is good and what the contribution is to the field of research.
Draw the diagram (Model) of it to simulate it
Discuss the limitations; justify why you think these are limitations and how this fits into your own research.
3. Conclusion XXXXXXXXXXwords)
Summarise the key findings from the literature review (positive); restate the limitations; based
on these limitations, justify your research proposal.
4. References
NOTE: Use (Grammar Check) link in left side bar of interact for your final work before you meet one of the Study Support Team and also before submitting your work.
cloud computing with AES encryption for Health secto
(
18
cloud
computing with AES encryption for Health secto
)
Table of contents
1) Journal 1
2) Journal 2
3) Journal3
4) Journal 4
5) Journal 5
6) Journal 6
7) Journal 7
8) Journal 8
9) Journal 9
10) Journal 10
11) Journal 11
12) Journal12
13) Journal 13
14) Journal 14
15) Journal15
16) Journal 16
17) Journal 17
18) Journal 18
19) Journal 19
20) Journal 20
Version 1.0 _ Week 1 (5 Journal Papers from CSU Li
ary)
1.
Reference in APA format that will be in 'Reference List'
Babitha,M.P. & Babu Ramesh, K.R XXXXXXXXXXSecure cloud storage using AES encryption
Citation that will be in the content
URL of the Reference
Level of Journal (Q1, Q2, …Qn)
Keywords in this Reference
https:
ieeexplore.ieee.org/document/7877709/keywords
Q1
Cloud Computing
AES Encryption
Data security
The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution & What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Secure cloud storage using AES encryption
Tools:
Advanced Encryption standard
Applied Area:
La
Medical
Hospital
Problem: due to the multiple users and multiple user, data accessibility and privacy is very crucial. So there is a need to cloud data before encrypted.
Goal: data is secured by encryption. The advanced encryption standard performed both encryption and decryption process. The main goal is to make data secure and scalable while patient centric.
Cloud serve
Personal Health Records
Personal Doctor, Family, Friends
Emergency department
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
Initially attribute is selected by owner and then provide access right in public domain. File encrypted with AES and ABS and data stored on cloud server. User request data from cloud server. After that access key is provide to emergency department by owner.
Data encrypted: specific data of a patient share with doctor but others are not able to see information
Security issue: the uploaded data in the cloud can be modified and tempered.
2
AES is more suitable in encryption. ABS is more expensive. So data encrypted with AES 128 key and again data decrypted with AES 128.
Improved Processing time.
3
The encrypted data and encrypted data key both are stored on cloud server.
Improved performance.
4
Data of patient records stored on cloud server by using AES technique. Data is more secure and privte.
Secured privacy
5
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Attributes
Access keys
Delegates Keys
Encrypted data using AES
Processing time
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
Input (Data)
Output (View)
AES encrypted data
X-RAy
It have Data Privacy and security of Electronic health records(EHR) on cloud server.
Data hacking is the main limitation of this research.
(Describe the research/cu
ent solution)
Evaluation Criteria
How this research/cu
ent solution is valuable for your project
There are several cryptographic algorithm are used for encryption of data. The privacy of data is secured by using AES. These algorithms are symmetric and asymmetric.
AES technique
This solution is more useful in Health sector. Data privacy and security on cloud by using AES. Cloud computing is used for control, manage and access data.
Diagram/Flowchart
2.
Reference in APA format that will be in 'Reference List'
Bouchti, A.E., Bahsani,S. & Nahhal,T XXXXXXXXXXEncryption as a service for data healthcare cloud security. 2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)
Citation that will be in the content
Bouchti,2016
URL of the Reference
Level of Journal (Q1, Q2, …Qn)
Keywords in this Reference
https:
ieeexplore.ieee.org/document/7605072
Q1
Data healthcare cloud security services
Encryption algorithm
The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution & What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Encryption as a service for data healthcare cloud security
Tools:
Cryptography
Attributes based encryption
Applied Area:
Health secto
Problem: the main problem is privacy. Patients do not want to share data to any other accepts doctor.
Goal: the main goal is data privacy and security. The heath information of patient is stored on cloud.
Personal domain
Public domain
Cloud serve
Emergency staff
Public health records
Emergency department
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
Initially attributes are selected by PHR owner. Access key is provided the user by owner then file are encrypted with AES and after that data store on cloud server. Then data is access by user from cloud server. For future purpose, the access key is assigned to emergency department by PHR owner.
Improved performance
Security issue
2
AES(Advance Encryption standarad) is algorithm to encrypted and decrypt information. In encryption process, the number of rounds are:
For AES128 is 10
ForAES192 is 12
For AES256 is 14
Improved privacy
Lengthy process
3
The functions are executed by major loop of AES. The function of AES:
SubBytes()
ShiftRows()
MixColumns()
AddRoundKey()
After repeated transformation rounds, it makes data secure on cloud.
Technical issues
4
5
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Attributes
Access keys
Data request from cloud
Data access from cloud
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
Input (Data)
Output (View)
Encrypted data
DNA
It provides security and privacy to data and stored on cloud by AES technique in health sector.
Data security and data privacy
(Describe the research/cu
ent solution)
Evaluation Criteria
How this research/cu
ent solution is valuable for your project
Here data is encrypted by cryptographic algorithms. These algorithms are symmetric or asymmetric. AES and DES are symmetric. Performances of these algorithms are different.
Attribute based Encryption
Advanced Encryption standard
This research provides privacy and security to the data in heath sector. Technique may be different but data stored and accessed from cloud.
Diagram/Flowchart
3.
Reference in APA format that will be in 'Reference List'
Josephius Arunkumar,R. & Anbuselvi, R XXXXXXXXXXEahancement of cloud computing security in healthcare sector. IJCSMC, Vol. 6, Issue. 8, August 2017, pg.23 – 31
Citation that will be in the content
Josephius,2017
URL of the Reference
Level of Journal (Q1, Q2, …An)
Keywords in this Reference
https:
www.ijcsmc.com/docs/papers/August2017/V6I XXXXXXXXXXpdf
Q2
Electronic Health record
Cloud environment
The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution &What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name: Eahancement of cloud computing security in healthcare secto
Tools: AES
Applied Area:
Patients Health
Hospital
Problem: the problem of data privacy and data security. Now data is centralised due to