Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

R​eview ​B​ased ​P​roject Literature Review (Secondary Research) Template Student's Name and CSU ID Abirbhav Pokhrel XXXXXXXXXX Project Type Review Based Project Name Encryption using Advanced...

1 answer below »
R​eview ​B​ased ​P​roject Literature Review (Secondary Research) Template

Student's Name and CSU ID Abi
hav Pokhrel XXXXXXXXXX
Project Type Review Based
Project Name Encryption using Advanced encryption standard for health records in Hy
id cloud
Technolog
y
Hy
id Cloud
Techniques Encryption using Advanced Encryption Standard
Domain Health records
Questions Need to be Answered
How is network security, data protections, virtualization security, application integrity and identity
management achieved in cloud services?
How can you guarantee data protection of data while transfe
ing data to remote server?
How can hardware implementation be done to ensure security of the medical data?

NOTE: Please you need to use YOUR OWN WORDS in writing this template.
● Your Literature Review Should be in Scope and MUST ​Address all Your Project's Questions
● You should ​ONLY​ use CSU li
ary​, and Google search is ​NOT​ allowed. The papers you select should be in ​last 3 years​. If you are in 2018, then you
need to collect 2018, 2017, and 2016.
● We encourage you to search for ​Journal papers​ rather than conference papers as it will give you more details.
● Check the ​Journal ranking​ (Q1, Q2)​ of the journal based on uploaded excel sheet in interact.
Version 1.0 _ Week 1 (5 Journal Papers from CSU Li
ary)
1
1

Reference in APA format that will be in
'Reference List' Babitha,M.P. & Babu Ramesh, K.R.(2016).​ ​Secure cloud storage using AES encryption


Citation that will be in the content (Babitha, M., et. al., 2016)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https:
ieeexplore.ieee.org/document/787
7709/keywords
Q1 Cloud Computing
AES Encryption
Data security
The Name of the Cu
ent Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution & What
is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Secure cloud storage using AES encryption
Tools:
Advanced Encryption standard
Applied Area:
Lab
Medical
Hospital
Problem: ​due to the multiple users and
multiple users, data accessibility and privacy is
very crucial. So there is a need to cloud data
efore encrypted.
Goal: data is secured by encryption. The
advanced encryption standard performed
oth encryption and decryption process. The
main goal is to make data secure and scalable
while patient centric.
Cloud server
Personal Health Records
Personal Doctor, Family, Friends
Emergency department
2
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Initially attribute is selected by owner and then
provide access right in public domain. File
encrypted with AES and ABS and data stored on
cloud server. User request data from cloud
server. After that access key is provide to
emergency department by owner.
Data encrypted: specific data of a patient
share with doctor but others are not able to
see information
Security issue: the uploaded data in the
cloud can be modified and tempered.
2 AES is more suitable in encryption. ABS is more
expensive. So data encrypted with AES 128 key
and again data decrypted with AES 128.
Improved Processing time.
3 The encrypted data and encrypted data key
oth are stored on cloud server.
Improved performance.
4 Data of patient records stored on cloud server
y using AES technique. Data is more secure
and private.
Secured privacy
5
Validation Criteria (Measurement Criteria)
Dependent Variable Independent Variable
3

Attributes Access keys
Delegates Keys
Encrypted data using AES
Processing time
Input and Output Critical Thinking: Feature of this work, and Why
(Justify)
Critical Thinking: Limitations of the research
cu
ent solution, and Why (Justify)
Input (Data) Output (View)
AES encrypted data
X-Ray
It has Data Privacy and security of Electronic
health records (EHR) on cloud server.
Data hacking is the main limitation of this
esearch. To secure unauthorized access of
sensitive data, encrypted standard are used.
Sometime co
ectness of end results such as X ray
is affected by the laziness of cloud server.
(Describe the research/cu
ent solution) Evaluation Criteria How this research/cu
ent solution is valuable
for your project
There are several cryptographic algorithm are
used for encryption of data. The privacy of data is
secured by using AES. These algorithms are
symmetric and asymmetric.
AES technique This solution is more useful in Health sector. Data
privacy and security on cloud by using AES. Cloud
computing is used for control, manage and access
data.
Diagram/Flowchart
4
Reference in APA format that will be in 'Reference List'
(This give the Reference of the ​Journal Paper that the author selected and improve it (State of art of his work)​)
at least 2 key references the author used as a base>
Citation that will be in the content
2
Reference in APA format that will be in
'Reference List'
Bouchti, A.E., Bahsani,S. & Nahhal,T XXXXXXXXXXEncryption as a service for data healthcare cloud security. ​ ​2016
Fifth International Conference on Future Generation Communication Technologies (FGCT)
Citation that will be in the content (Bouchti A., et. al.,2016)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https:
ieeexplore.ieee.org/document/760
5072
Q1 Data healthcare cloud security services
Encryption algorithm
The Name of the Cu
ent Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution & What
is the Problem that need to be solved
What are the components of it?
5

https:
ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7602797
https:
ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7602797
Technique/Algorithm name:
Encryption as a service for data healthcare
cloud security
Tools:
Cryptography
Attributes based encryption
Applied Area:
Health secto
Problem: the main problem is privacy.
Patients do not want to share data to any
other accepts doctor.
Goal: the main goal is data privacy and
security. The heath information of patient is
stored on cloud.
Personal domain
Public domain
Cloud server
Emergency staff
Public health records
Emergency department
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Initially attributes are selected by PHR owner.
Access key is provided the user by owner then
file are encrypted with AES and after that data
store on cloud server. Then data is access by
user from cloud server. For future purpose, the
access key is assigned to emergency
department by PHR owner.
Improved performance Security issue
6

2 AES ( Advance Encryption standard) is algorithm
to encrypted and decrypt information. In
encryption process, the number of rounds are:
For AES128 is 10
For AES192 is 12
For AES256 is 14
Improved privacy Lengthy process
3 The functions are executed by major loop of
AES. The function of AES:
SubBytes()
ShiftRows()
MixColumns()
AddRoundKey()
After repeated transformation rounds, it makes
data secure on cloud.
Technical issues
Validation Criteria (Measurement Criteria)
Input and Output Critical Thinking: Feature of this work, and Why
(Justify)
Critical Thinking: Limitations of the research
cu
ent solution, and Why (Justify)
7
Input (Data) Output (View)
Encrypted data
DNA
It provides security and privacy to data and stored
on cloud by AES technique in health sector.
Data security and data privacy on cloud server are
ensured through AES. In AES, The a
angement of
Attribute by data. The drawback of cloud server is
if the decryption key is known by anyone then
data retrieved from cloud easily. So decryption
key used as private key which is present for
doctor who used it to get the information of
patients from EHR.
(Describe the research/cu
ent solution) Evaluation Criteria How this research/cu
ent solution is valuable
for your project
Here data is encrypted by cryptographic
algorithms. These algorithms are symmetric or
asymmetric. AES and DES are symmetric.
Performances of these algorithms are different.
Attribute based Encryption
Advanced Encryption standard
This research provides privacy and security to the
data in heath sector. Technique may be different
ut data stored and accessed from cloud.
Diagram/Flowchart
3
Reference in APA format that will be in
'Reference List'
(This give the Reference of the ​Journal
Paper you are working on it​)
Fabian, B., Ermakova, T., & Junghanns, P XXXXXXXXXXCollaborative and secure sharing of healthcare data in
multi-clouds. Information Systems, 48, XXXXXXXXXX.
Citation that will be in the content (Fabian, et. al.) 2015
8

URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https:
www.sciencedirect.com/science/arti
cle/pii/S030643791400088X
Q2 Collaborative Medical records with improved security
Multi-Cloud storage
The Name of the Cu
ent Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
Answered Same Day Mar 30, 2021

Solution

Amit answered on Apr 08 2021
156 Votes
Literature Review (Secondary Research) Template
    Student Name& CSU ID
    
    Project Topic Title
    Encryption with AES for health records in hy
id cloud
    Version 1.0 _ Week 1 (5 Journal Papers from CSU Li
ary)
    1
    Reference in APA format that will be in 'Reference List'
    Elhoseny, M., Ramírez-González, G., Abu-Elnasr, O. M., Shawkat, S. A., Arunkumar, N., & Farouk, A. (2018). Secure medical data transmission model for IoT-based healthcare systems. IEEE Access, 6, 20596-20608.
    Citation that will be in the content
    Elhoseny et al, 2018
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    https:
ieeexplore.ieee.org/abstract/document/8320774
    Q1
    Encryption
Medical diagnostic imaging
Medical services
Data models
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
RSA, AES
Tools:
Image processing tools
Applied Area:
Healthcare area
    Problem:
The application of healthcare faces the challenges of integrity on hy
id cloud.
Goal:
To use discrete wavelet for solving the integration issues on hy
id cloud implementing healthcare database.
    2D-DWT-1L
RSA implementation,
Refined security to hy
id cloud.
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    The complete message of healthcare report is divided into two parts.
    Security is improved.
    NA
    2
    AES based public and private keys are generated.
    Authorized access is maintained.
    NA
    3
    Hashes with compressed messages are developed.
    Use of hash improves reliability.
    
    4
    Cipher is returned.
    
    
    5
    
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Processing time
    Processed data frames of hy
id cloud on every second
    Accuracy
    
    Maintenance
    
    
    
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
        Input (Data)
    Output (View)
    Raw patient data is input.
    Secured processed data is output.
    The 2D-DWT-1L and AES provide the required security level to healthcare data.
    This research focus on both AES and 2D-DWT-1L at same time. But the implementation algorithm mainly uses AES which can cause e
ors in data processing.
    (Describe the research/cu
ent solution)
    Evaluation Criteria
    How this research/cu
ent solution is valuable for your project
    The cu
ent solution presented in this research is providing an effective solution to required security level in hy
id cloud for medical data. The proper processing of images is also ca
ied out in it.
    The medical professionals can use the suggested techniques to improve and maintain the required security level while sharing reports with their patients.
    The security and image processing issues are directly solved in this paper for hy
id cloud. Thus, it is a valuable paper.
    Diagram/Flowchart
    
    2
    Reference in APA format that will be in 'Reference List'
    Le, D. N., Seth, B., & Dalal, S. (2018). A Hy
id Approach of Secret Sharing with Fragmentation and Encryption in Cloud Environment for Securing Outsourced Medical Database: A Revolutionary Approach. Journal of Cyber Security and Mobility, 7(4), 379-408.
    Citation that will be in the content
    Le, Seth & Dalal, 2018
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    https:
www.riverpublishers.com/journal_read_html_article.php?j=JCSM/7/4/2
    Q3
    Cloud Computing
Healthcare
Database Outsourcing
Secret Sharing
Fragmentation
Encryption
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
Fragmentation
Secret sharing
AES encryption
Tools:
Trusted DBMS tools
Applied Area:
Healthcare data on cloud
    Problem:
The data outsourcing on hy
id cloud
ings effective storage and great attention but medical data requires more security and that security management is main problem.
Goal:
Maintain required security levels for healthcare industry and
ing advantages by fragmentation and secret sharing.
    The components are
1. Fragmentation
2. Secret sharing
3. AES encryption
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    Distributed styles are applied for creating fragmentations.
    Security is improved.
    The encryption technique is selected in last and this is based on block size, so, data
each can be created.
    2
    Decision hierarchy is developed for each data node.
    Authorized access is maintained.
    
    3
    Attribute is placed in new stake for secret sharing.
    Secret sharing becomes possible.
    
    4
    AES is applied to stake for secret sharing.
    
    
    5
    Parameter based computation on block size is performed to select best techniques.
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Algorithm selection.
    Data bits of healthcare data.
    Reliability of algorithm.
    
    Processing of secured sharing.
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
        Input (Data)
    Output (View)
    Raw patient data is input.
    Secured sharing of data is output.
    The fragmentation, secret sharing and AES provide the required security level to healthcare data.
    This research focus on fragmentation, secret sharing and AES at same time. The encryption technique is selected in last and this is based on block size, so, data
each can be created.
    (Describe the research/cu
ent solution)
    Evaluation Criteria
    How this research/cu
ent solution is valuable for your project
    The cu
ent solution presented in this research is providing an effective solution to required security level in hy
id cloud for medical data. The proper processing of secret sharing and fragmentation is also ca
ied out in it.
    The medical professionals can use the suggested techniques to improve and maintain the required security level while secretly sharing reports with their patients.
    The security with fragmentation and different encryption techniques are directly solved in this paper for hy
id cloud. Thus, it is a valuable paper.
    Diagram/Flowchart
    
    3
    Reference in APA format that will be in 'Reference List'
    Thilakanathan, D., Calvo, R. A., Chen, S., Nepal, S., & Glozier, N. (2016). Facilitating secure sharing of personal health data in the cloud. JMIR medical informatics, 4(2), e15.
    Citation that will be in the content
    Thilakanathan et al, 2016
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    https:
medinform.jmir.org/2016/2/e15/?utm_source=TrendMD&utm_medium=cpc&utm_campaign=JMIR_TrendMD_0
    Q2
    self care; telemedicine; privacy; computer security; information dissemination
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution &What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
ELGAMAL encryption
Data sharing
Tools:
Hy
id cloud.
Applied Area:
Patient record management on cloud.
    Problem:
The data outsourcing on hy
id cloud
ings effective storage and great attention but medical data requires more security and that security management is main problem.
Goal:
To implement required security levels for healthcare industry and
ing advantages by data sharing through ELGAMAL encryption.
    The components are
1. ELGAMAL encryption
2. Data sharing
3. AES encryption
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    Patient provides user name to access application.
    Security is improved.
    The implementation of data access protocol increases the complexity in required outcome, so, processing time is also increased.
    2
    The application makes verification of credentials.
    Authorized access is maintained.
    
    3
    The CSP makes verification of required information from cloud.
    Secret sharing becomes possible.
    
    4
    Doctor verifies the information for providing advises.
    
    
    5
    Privacy among doctor and patient is maintained.
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Algorithm selection.
    Data bits of healthcare data.
    Reliability of algorithm.
    
    Processing of secured sharing.
    
    Data flow through application.
    
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
        Input (Data)
    Output (View)
    Raw patient data is input.
    Secured sharing of data among patient and doctor..
    The ELGAMAL encryption and data sharing with AES provide the required security level to healthcare data.
    This research focus on ELGAMAL encryption and data sharing. The data flow before process is not secured.
    (Describe the research/cu
ent solution)
    Evaluation Criteria
    How this research/cu
ent solution is valuable for your project
    The cu
ent solution presented in this research is providing an effective solution to required security level in hy
id cloud for medical data. The proper processing of secret sharing and ELGAMAL encryption is also ca
ied out in it.
    The medical professionals can use the suggested techniques to improve and maintain the required security level while secretly sharing reports with their patients.
    The security with ELGAMAL encryption and data...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here