time enabling method to approach to secure data based on blockchain

Nivetha.V,Jayaramya.E,Indra.V,Malathi.S

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 24 April,2023         Pages:1748-1753

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

There are several research works focusing on preserving the privacy of the electronic healthcare record company. We propose a proxy Blowfish encryption approach to secure data sharing in cloud environments. Data owners can outsource their encrypted data to the cloud using identity-based encryption, while blowfish encryption construction will grant legitimate users access to the data. we design an inference attack-resistant e-healthcare cloud system with fine grained access control. We first propose a three-layer encryption scheme. To ensure an efficient and fine-grained access control over the company data. Further, our system model is based on blockchain, a disruptive technology that enables decentralization in data sharing. This Technique will allow only limited access rights to an authorized agent to access the records for a specific time period. This technique will use a searchable encryption technique. Process of design applications with this method is through several stages, such as process of encryption, decryption, key generation and testing of the methods used. To reduce the storage problem in Cloud we have split the file into different block and get stored, so storage problem get rectified. By using those methods and algorithm our company Data can share privacy and secure. The security analysis and evaluation of our scheme show the promise of our approach in ensuring data confidentiality, integrity, and security.

Kewords

Access Control, Blockchain, Data Security

Reference

[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A survey on enabling technologies, protocols, and applications,” IEEE Commun. Surveys Tut., vol. 17, no. 4, pp. 2347– 2376, Oct./Dec. 2015. [2] M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic proxy cryptography,” in Proc. Int. Conf. Theory Appl. Cryptographic Techn., Springer, May 1998, pp. 127– 144. [3] A. Shamir, “Identity-based cryptosystems and signature schemes,” in Proc. Workshop Theory Appl. Cryptographic Techn., Springer, Aug. 1984, pp. 47–53. [4] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Proc. Int. Conf. Theory Appl. Cryptographic Techn., Springer, May 2004, pp. 506– 522. [5] B. R. Waters, D. Balfanz, G. Durfee, and D. K.Smetters, “Building an encrypted and searchable audit log,” in NDSS, vol. 4. Citeseer, Feb. 2004, pp. 5– 6. [6] D. Balfanz et al., “Secret handshakes from pairing-based key agreements,” in Proc. IEEE, Symp. Secur. Privacy, 2003, pp. 180–196. [7] R. Canetti, S. Halevi, and J.Katz, “Chosen cipher text security from identity-based encryption,” in Proc. Int. Conf. Theory Appl. Cryptographic Techn., Springer, 2004, pp. 207– 222. [8] T. Koponen et al., “A data-oriented (and beyond) network architecture,” in Proc. Conf. Appl., Techn., Architectures, Protoc. Comput. Commun., Aug. 2007, pp. 181–192. [9] N. Fotiou, P. Nikander, D. Trossen, and G. C. Polyzos, “Developing information networking further: From PSIRP to pursuit,” in Proc. Int. Conf. Broadband Commun., Netw. Syst., Springer, Oct. 2010, pp. 1–13. [10] C. Dannewitz, J. Golic, B. Ohlman, and B. Ahlgren, “Secure naming for a network of information,” in Proc. INFOCOM IEEE Conf. Comput. Commun. Workshops,2010, pp. 1–6. [11] A. Carzaniga, M. J. Rutherford, and A. L. Wolf, “A routing scheme for content-based networking,” in Proc. IEEE INFOCOM 2004, vol. 2, 2004, pp. 918–928. [12] I. Psaras, W. K. Chai, and G. Pavlou, “ Probabilistic in-network caching for information centric networks,” in Proc. 2nd ed. ICN Workshop Inform.- Centric Netw., Aug. 2012, pp. 55–60. [13] Y. Sun et al., “Trace-driven analysis of ICN caching algorithms on videoon-demand workloads,” in Proc. 10th ACM Int. Conf. Emerging Netw. Exp. Technol., Dec. 2014, pp. 363–376.