Review Based Project Literature Review (Secondary Research) Template
Student's Name and CSU ID Abi
hav Pokhrel XXXXXXXXXX
Project Type Review Based
Project Name Encryption using Advanced encryption standard for health records in Hy
id cloud
Technolog
y
Hy
id Cloud
Techniques Encryption using Advanced Encryption Standard
Domain Health records
Questions Need to be Answered
How is network security, data protections, virtualization security, application integrity and identity
management achieved in cloud services?
How can you guarantee data protection of data while transfe
ing data to remote server?
How can hardware implementation be done to ensure security of the medical data?
NOTE: Please you need to use YOUR OWN WORDS in writing this template.
● Your Literature Review Should be in Scope and MUST Address all Your Project's Questions
● You should ONLY use CSU li
ary, and Google search is NOT allowed. The papers you select should be in last 3 years. If you are in 2018, then you
need to collect 2018, 2017, and 2016.
● We encourage you to search for Journal papers rather than conference papers as it will give you more details.
● Check the Journal ranking (Q1, Q2) of the journal based on uploaded excel sheet in interact.
Version 1.0 _ Week 1 (5 Journal Papers from CSU Li
ary)
1
1
Reference in APA format that will be in
'Reference List' Babitha,M.P. & Babu Ramesh, K.R.(2016). Secure cloud storage using AES encryption
Citation that will be in the content (Babitha, M., et. al., 2016)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https:
ieeexplore.ieee.org/document/787
7709/keywords
Q1 Cloud Computing
AES Encryption
Data security
The Name of the Cu
ent Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution & What
is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Secure cloud storage using AES encryption
Tools:
Advanced Encryption standard
Applied Area:
Lab
Medical
Hospital
Problem: due to the multiple users and
multiple users, data accessibility and privacy is
very crucial. So there is a need to cloud data
efore encrypted.
Goal: data is secured by encryption. The
advanced encryption standard performed
oth encryption and decryption process. The
main goal is to make data secure and scalable
while patient centric.
Cloud server
Personal Health Records
Personal Doctor, Family, Friends
Emergency department
2
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Initially attribute is selected by owner and then
provide access right in public domain. File
encrypted with AES and ABS and data stored on
cloud server. User request data from cloud
server. After that access key is provide to
emergency department by owner.
Data encrypted: specific data of a patient
share with doctor but others are not able to
see information
Security issue: the uploaded data in the
cloud can be modified and tempered.
2 AES is more suitable in encryption. ABS is more
expensive. So data encrypted with AES 128 key
and again data decrypted with AES 128.
Improved Processing time.
3 The encrypted data and encrypted data key
oth are stored on cloud server.
Improved performance.
4 Data of patient records stored on cloud server
y using AES technique. Data is more secure
and private.
Secured privacy
5
Validation Criteria (Measurement Criteria)
Dependent Variable Independent Variable
3
Attributes Access keys
Delegates Keys
Encrypted data using AES
Processing time
Input and Output Critical Thinking: Feature of this work, and Why
(Justify)
Critical Thinking: Limitations of the research
cu
ent solution, and Why (Justify)
Input (Data) Output (View)
AES encrypted data
X-Ray
It has Data Privacy and security of Electronic
health records (EHR) on cloud server.
Data hacking is the main limitation of this
esearch. To secure unauthorized access of
sensitive data, encrypted standard are used.
Sometime co
ectness of end results such as X ray
is affected by the laziness of cloud server.
(Describe the research/cu
ent solution) Evaluation Criteria How this research/cu
ent solution is valuable
for your project
There are several cryptographic algorithm are
used for encryption of data. The privacy of data is
secured by using AES. These algorithms are
symmetric and asymmetric.
AES technique This solution is more useful in Health sector. Data
privacy and security on cloud by using AES. Cloud
computing is used for control, manage and access
data.
Diagram/Flowchart
4
Reference in APA format that will be in 'Reference List'
(This give the Reference of the Journal Paper that the author selected and improve it (State of art of his work))
at least 2 key references the author used as a base>
Citation that will be in the content
2
Reference in APA format that will be in
'Reference List'
Bouchti, A.E., Bahsani,S. & Nahhal,T XXXXXXXXXXEncryption as a service for data healthcare cloud security. 2016
Fifth International Conference on Future Generation Communication Technologies (FGCT)
Citation that will be in the content (Bouchti A., et. al.,2016)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https:
ieeexplore.ieee.org/document/760
5072
Q1 Data healthcare cloud security services
Encryption algorithm
The Name of the Cu
ent Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution & What
is the Problem that need to be solved
What are the components of it?
5
https:
ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7602797
https:
ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7602797
Technique/Algorithm name:
Encryption as a service for data healthcare
cloud security
Tools:
Cryptography
Attributes based encryption
Applied Area:
Health secto
Problem: the main problem is privacy.
Patients do not want to share data to any
other accepts doctor.
Goal: the main goal is data privacy and
security. The heath information of patient is
stored on cloud.
Personal domain
Public domain
Cloud server
Emergency staff
Public health records
Emergency department
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Initially attributes are selected by PHR owner.
Access key is provided the user by owner then
file are encrypted with AES and after that data
store on cloud server. Then data is access by
user from cloud server. For future purpose, the
access key is assigned to emergency
department by PHR owner.
Improved performance Security issue
6
2 AES ( Advance Encryption standard) is algorithm
to encrypted and decrypt information. In
encryption process, the number of rounds are:
For AES128 is 10
For AES192 is 12
For AES256 is 14
Improved privacy Lengthy process
3 The functions are executed by major loop of
AES. The function of AES:
SubBytes()
ShiftRows()
MixColumns()
AddRoundKey()
After repeated transformation rounds, it makes
data secure on cloud.
Technical issues
Validation Criteria (Measurement Criteria)
Input and Output Critical Thinking: Feature of this work, and Why
(Justify)
Critical Thinking: Limitations of the research
cu
ent solution, and Why (Justify)
7
Input (Data) Output (View)
Encrypted data
DNA
It provides security and privacy to data and stored
on cloud by AES technique in health sector.
Data security and data privacy on cloud server are
ensured through AES. In AES, The a
angement of
Attribute by data. The drawback of cloud server is
if the decryption key is known by anyone then
data retrieved from cloud easily. So decryption
key used as private key which is present for
doctor who used it to get the information of
patients from EHR.
(Describe the research/cu
ent solution) Evaluation Criteria How this research/cu
ent solution is valuable
for your project
Here data is encrypted by cryptographic
algorithms. These algorithms are symmetric or
asymmetric. AES and DES are symmetric.
Performances of these algorithms are different.
Attribute based Encryption
Advanced Encryption standard
This research provides privacy and security to the
data in heath sector. Technique may be different
ut data stored and accessed from cloud.
Diagram/Flowchart
3
Reference in APA format that will be in
'Reference List'
(This give the Reference of the Journal
Paper you are working on it)
Fabian, B., Ermakova, T., & Junghanns, P XXXXXXXXXXCollaborative and secure sharing of healthcare data in
multi-clouds. Information Systems, 48, XXXXXXXXXX.
Citation that will be in the content (Fabian, et. al.) 2015
8
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https:
www.sciencedirect.com/science/arti
cle/pii/S030643791400088X
Q2 Collaborative Medical records with improved security
Multi-Cloud storage
The Name of the Cu
ent Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )