Privacy Preserving Using AES-Mapping in Mix Column Encryption Algorithm: Cloud Approach
DOI:
https://doi.org/10.26438/ijcse/v7i9.201206Keywords:
Cloud approach, privacy preserving, S.BOX mapping in mix column, KNN, MATLAB 2014aAbstract
In this paper we evaluate the efficient, scalable and practical method for privacy-preserving using k-nearest neighbors (KNN) classification method for EMR data. The approach enables performing the widely used k-NN classification method in complex scenarios where none of the parties reveal their information while they can still cooperatively find the nearest matches. To development AES- S.BOX mapping in mix column privacy preserving model used for preserving the privacy of the patients data in a cloud assisted system as the complex information is needed to be maintained confidential and should not be revealed to public users other than the physicians. As we know AES is based on several mathematical perform for security purpose substitutions, permutation and transformation.
References
[1] A. Andoni and P. Indyk. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In FOCS, 2006.
[2] M. Bellare, V. Tung Hoang, Sriram K., and P. Rogaway. Efficient garbling from a fixed-key block cipher. In S&P. IEEE, 2013.
[3] J. Boyar and R. Peralta “Concrete multiplicative complexity of symmetric functions in MFCS” Springer, 2006
[4] Brenner, perl, and Smith. hcrypt Secure Function Evaluation (SFE) project. https://hcrypt.com/sfe/.
[5] H. Carter, C. Lever, and P. Traynor. Whitewash: Outsourcing garbled circuit generation for mobile devices. In ACSAC. ACM, 2014.
[6] H. Carter, B. Mood, P. Traynor, and K. Butler. Secure outsourced garbled circuit evaluation for mobile phones. In USENIX Security. USENIX, 2013.
[7] D. Demmler, T. Schneider, and M. Zohner. Ad-hoc secure two-party computation on mobile devices using hardware tokens. In USENIX Security. USENIX, 2014.
[8] C. Gentry. “Fully homomorphic encryption using ideal lattices”. In STOC, 2009.
[9] A. Bessani, M. Correia, B. Quaresma, F. Andr´e, and P. Sousa, “Depsky: Dependable and secure storage in a cloud-of-clouds,” in Proceedings of the Sixth Conference on Computer Systems, 2011, pp. 31–46.
[10] E. Stefanov, M. van Dijk, A. Juels, and A. Oprea, “Iris: A scalable cloud file system with efficient integrity checks,” in Proceedings of the 28th Annual Computer Security Applications Conference, 2012, pp. 229–238.
[11] Y. Chen and R. Sion, “On securing untrusted clouds with cryptography,” in Proceedings of the 9th annual ACM workshop on Privacy in the electronic society. ACM, 2010, pp. 109– 114.
[12] R. Laurikainen, “Secure and anonymous communication in the cloud,” Aalto University School of Science and Technology, Department of Computer Science and Engineering, Tech. Rep. TKK-CSE-B10, 2010.
[13] Sushmita Ruj, Milos Stojmenovic and Amiya Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds”in proceedings of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
[14] Debajyoti Mukhopadhyay, Gitesh Sonawane, Parth Sarthi Gupta, Sagar Bhavsar, Vibha Mittal.” Enhanced Security for Cloud Storage using File Encryption” Department of Information Technology Maharashtra Institute of Technology
[15] Kawser Wazed Nafi1,2, Tonny Shekha Kar2, Sayed Anisul Hoque3, Dr. M. M. A Hashem4, “ A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture”in proceeding of the (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2011
[16] Du meng.” Data security in cloud computing” in yhe proceeding of the The 8th International Conference on Computer Science & Education (ICCSE 2013) April 26-28, 2013. Colombo, Sri Lanka.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
