5 research outputs found

    A SURVEY ON EDUCATIONAL DATA MINING AND RESEARCH TRENDS

    Get PDF
    ABSTRAC

    HEX-BLOOM: An Efficient Method for Authenticity and Integrity Verification in Privacy-preserving Computing

    Get PDF
    Merkle tree is applied in diverse applications, namely, Blockchain, smart grid, IoT, Biomedical, financial transactions, etc., to verify authenticity and integrity. Also, the Merkle tree is used in privacy-preserving computing. However, the Merkle tree is a computationally costly data structure. It uses cryptographic string hash functions to partially verify the data integrity and authenticity of a data block. However, the verification process creates unnecessary network traffic because it requires partial hash values to verify a particular block. Moreover, the performance of the Merkle tree also depends on the network latency. Therefore, it is not feasible for most of the applications. To address the above issue, we proposed an alternative model to replace the Merkle tree, called HEX-BLOOM, and it is implemented using hash, Exclusive-OR and Bloom Filter. Our proposed model does not depends on network latency for verification of data block\u27s authenticity and integrity. HEX-BLOOM uses an approximation model, Bloom Filter. Moreover, it employs a deterministic model for final verification of the correctness. In this article, we show that our proposed model outperforms the state-of-the-art Merkle tree in every aspect

    SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user\u27s secret data

    Get PDF
    Data secrecy is a major concern in many domains. Nowadays, the data are kept in tight security with high privacy. Users do not want to share their secret information with anyone; however, the users\u27 confidential data are not protected from the administrators. Administrators can read the users\u27 data. Why should any Administrator read users\u27 data? To address this issue, we propose a new secrecy protocol to store data secretly, named Secret Cloud Storage, SecretStore for short, to enable Secrecy as a Service model over the Cloud Computing paradigm. This article demonstrates how to protect users\u27 data from any unintended users, including the data administrators. Moreover, we introduce tight security using the client-side symmetric cryptography method. In addition, we devise a forgetful private key to generate or regenerate a private key to encrypt or decrypt based on a secret word. We also show how to strengthen the weak password. Finally, we demonstrate how to implement the Secrecy as a Service model in Cloud Storage using highly unpredictable private keys

    Improving security of medical big data by using Blockchain technology

    No full text
    Big data refers to a very large and diverse set of data that grow at exponential rates. In the modern healthcare system, medical big data face many security issues due to the presence of hackers and malicious users. Nowadays, medical big data are tremendously benefitted by Blockchain technology due to its several features, namely decentralization, confidentiality, security, privacy, etc. Nevertheless, the conventional cloud and client-server-based information storage models in healthcare are suffering from single-point failure, centralized control of data resources and privacy leakage. This paper explores the usages of Blockchain technology to manage the healthcare system by providing a solution to these problems. Here, a distributed scheme is proposed for data management, which is used to implement Blockchain technology in the healthcare sector. The proposed scheme ensures security by specifying rules with a smart contract. Results and discussions show that the proposed scheme is more efficient than the existing schemes
    corecore