尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1537
Survey on Medical Data Sharing Systems with NTRU
Amruta Shete R1, S.D.Satav2
1 ME Computer Engineering, Jayawantrao Sawant College of Engineering, Hadapsar Pune-28, Savitribai Phule
Pune University, Pune, India
2 Assistant Professor, Information Technology, Jayawantrao Sawant College of Engineering, Hadapsar Pune-28,
Savitribai Phule Pune University, Pune, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -
Health Record of an individual personalisavitalwaythatcan
be utilized for keeping track of the patient data in accurate,
reliable as well as complete manner. The sharing of health
records permits the patient to make andredesigntheir details,
furthermore, share their data with various users as well as
medicinal services suppliers. While sharing the healthcare
data in the cloud, the clients have handled a few issues, for
example, security, scalable key managements, userrevocation
and flexible access controls. This survey gives a study on
various techniques created for sharing of medical data using
cloud and by analyzing they enlisted their pros and cons.
Key Words: Security, data sharing, collaborative
intrusion detection system (IDS), healthcare, NTRU.
I. INTRODUCTION
Cloud Computing is the one of the popular technology
in IT that provides various services to the user via
Internet. Cloud system empowers the information
sharing system which gives the variety of services to
the user. According to the studies all the companies
shares 74% of their information with the users as well
as 64% if their information with the suppliers using
cloud storage system. In this way sharing of data is the
higher priority task which plays an important role in
any organizationbywhichtheproductivityinthecloud
environment is increased. The shared cloud services
are effectively available by the on-request network
access service as well as it is adaptable which is
accessible at lower cost. At the time of the sharing of
information the medical information or data sharing
assumes a fundamental part in light of the fact that the
patient data's are effortlessly open with least cost.
In day to day life the health record of the person is
trading technology in applications of medical that are
utilized for generating, managing as well as modifying
the health data related to the patient in very effective
way. The health records of the personal has different
data related to the patient such as identification sheet,
issues, medical records, progress notes, details of
consultation, lab reports, immunization records,
consent forms, imagingandx-rayreportsetc.Suchdata
records must be stored on the cloud for the sharing as
well asaccessmechanismthatisutilizedforcontrolling
the activities of the patient. In the personal health
record, sharing of the data is fine-grained access
control, security, data confidentiality, authorization
and authentication is crucial challenge while sharing
the personal health records in the third party storage.
At the time of uploading of personal health care datain
the cloud the owner of data losses the physical control
also it can be hacked by hackers. Hence the providing
the security is a big issue while sharingpersonalhealth
care data in cloud environment. This can be solved by
usingencryptionmechanismatthetimeofdatasharing
that will increase the confidentiality of the data as well
as information security in the third party storage
service. By making use of several encryption
techniques user can store the data on cloud without
worrying about the security.
In the next segment we will go through some of the
researches provided the different authors on Medical
Data Sharing Systems.
II. LITERATURE REVIEW
In paper [1] author build up a novel healthcare system
by utilizing the flexibility of cloudlet. The functions of
cloudlet consist of privacy protection,datasharingand
intrusion detection. In the stage of data collection,
firstly utilize Number Theory Research Unit (NTRU)
method to encrypt user as body data collected by
wearable devices. Those data will be end to nearby
cloudlet in an energy efficient fashion. Secondly,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1538
present a new trust model to help users to select
trustable partners whowanttosharestoreddatainthe
cloudlet. The trust model also helps identical patients
to communicate with each other about their diseases.
Thirdly, divide users medical data stored in remote
cloud of hospital into three parts,andgivethemproper
protection. Finally, in order to protect the healthcare
system from malicious attacks, design a novel
collaborative intrusion detection system(IDS)method
dependoncloudletmesh,whichcaneffectivelyprevent
the remote healthcare big data cloud from attacks.
In this paper [2], for the first time, define and solve the
challenging issue of privacy preservingmulti-keyword
ranked search overencryptedclouddata(MRSE).They
establish a set of strict privacy requirements for sucha
secure cloud data utilization system. Among various
multi-keyword semantics, they choose the efficient
similarity measure of “coordinate matching”, i.e., as
many matches as possible, to capture the relevance of
data documents to the search query. They further use
“inner product similarity” to quantitatively evaluate
such similarity measure. First propose a basic idea for
the MRSE based on secure inner product computation,
and then give two significantly improved MRSE
schemes to achieve various stringent privacy
requirementsintwodifferentthreatmodels.Thorough
study of inspectingprivacyandefficiencyguaranteesof
proposed schemes is given.
In this paper [3], author developed a secure and
privacy-preserving opportunistic computing
framework, called SPOC, for m-Healthcare emergency.
With SPOC, smart phone resources involving
computing power and energy can be opportunistically
collected to process the computing-intensive personal
health information (PHI) during m-Healthcare
emergencywithminimalprivacydisclosure.Inspecific,
to leverage the PHI privacy disclosure and the high
reliability of PHI process and transmission in m-
Healthcare emergency, They introduce an efficient
user-centricprivacyaccesscontrolinSPOCframework,
which is depend on an attribute-based access control
and a new privacy preserving scalar product
computation(PPSPC)technique,andpermitsamedical
user to decide who can participate in the opportunistic
computing to assist in processing his overwhelming
PHI data. Detailed security study display that the
proposedSPOCframeworkcanefficientlyachieveuser-
centric privacy access control in mHealthcare
emergency.
This paper [4] first introduces the main aim of this
special issue and gives a brief guideline. Then, the
present situation of the adoption of EMRs is reviewed.
After that, the emerging data technologies are
presented which have a great impact on thehealthcare
provision. These include health sensing for medical
data collection, medical data study and utilization for
accurate detection and prediction. Next, cloud
computing is discussed, as it may offer scalable and
cost-effective delivery of healthcare services.
This paper [5] developed a practical solution for
privacy preserving medical record sharing for cloud
computing. On the basis of the classification of the
attributes of medical records, they use vertical
partition of medical dataset to achieve the
consideration of distinct parts of medical information
with different privacy concerns. It mainly consisting
four components, i.e., (1) vertical data partition for
medical informationpublishing,(2)datacombiningfor
medical dataset accessing, (3) integrity checking, and
(4) hybrid search across plaintext and ciphertext,
where the statistical analysis and cryptography are
innovatively combined together to provide multiple
paradigms of balance among medical data utilization
and privacy protection. A prototype system for the
huge scale medical data access and distributing is
implemented.
The usage of electronic health data from distinct
sources for statistical analysis requiresatoolset where
the legal, security and privacy concerns have been
taken into consideration. The health data are typically
placed at different general practices and hospitals.The
data analysis includes of local processing at these
locations, and the locations become nodes in a
computing graph. To support the legal, security and
privacy
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1539
concerns, the proposed [6] toolset for statistical study
of health data uses a combinationofsecuremulti-party
computation (SMC) algorithms, symmetric and public
key encryption, and public key infrastructure (PKI)
with certificates and a certificate authority (CA). The
proposed toolset should cover a wide range of data
analysis with different data distributions. To
accomplish this, huge set of possible SMC algorithms
and computing graphs have to be supported.
In this paper [7],authorproposeaprioritybasedhealth
data aggregation (PHDA) scheme with privacy
preservation for cloud assisted WBANs to improve the
aggregation efficiency between different types of
health data. Specifically, first explore social spots to
help forward health data and enable users to selectthe
optimal relay according to their social ties. According
to distinct data priorities, the adjustable forwarding
methods can be selected to forward the user as health
data to the cloud servers with the reasonable
communication overheads. The security analysis
describes that the PHDA can achieve identity and data
privacy preservation, and resists the forgery attacks.
In this article [8], investigate security and privacy
protection in MHNs fromtheperspectiveofQoP,which
offers users adjustable security protections at fine-
grained levels. Specifically, first introduce the
architecture of MHN, and point out the security and
privacy limitations from the perspective of QoP. Then
present some countermeasures for security and
privacy protection in MHNs, consisting privacy-
preserving health data aggregation, secure health data
processing, and misbehavior detection.
Table 1: Survey Table
S
r.
N
o
Title Paper
Details
Met
hod
Used
Advan
tages
Disadvant
ages
1. Privacy
Protectio
n and
Intrusion
Avoidanc
e for
Cloudlet-
based
Medical
Data
Sharing
healthcare
system by
utilizing the
flexibility of
cloudlet
Numbe
r
Theory
Resear
ch Unit
Effectivel
y prevent
the
remote
healthcar
e big data
cloud
from
attacks.
---
2. Privacy-
preservin
g multi-
keyword
ranked
search
over
encrypte
d cloud
data
Privacy
preserving
multi-
keyword
ranked
search over
encrypted
cloud data
(MRSE).
coordi
nate
matchi
ng
Introduce
low
overhead
on both
computati
on and
communi
cation.
Integrity of the
rank order in the
search result
assuming the
cloud server is
untrusted.
3. Spoc: A
secure
and
privacy-
preservin
g
opportun
istic
computin
g
framewo
rk for
mobile-
healthcar
e
emergen
cy
developed a
secure and
privacy-
preserving
opportunist
ic
computing
framework,
called SPOC
attribu
te-
based
access
control
achieve
the
efficient
user-
centric
privacy
access
control
Can carry on
Smartphone-
based
experiments to
verify the
effectiveness of
the SPOC
framework.
4. Emerging
informati
on
technolo
gies for
enhanced
healthcar
e
adoption of
EMRs is
reviewed
cloud
comput
ing is
discuss
ed
Shown
that the
cloud can
be used
for
medical
health
care
records
storage
Does not cover
all the aspects
and applications
5.
Privacy
preservin
g health
data
processin
g
Proposed
toolset for
statistical
study of
health data
uses a
combinatio
n of secure
multi-party
computatio
n (SMC)
algorithms
a
combi
nation
of
secure
multi-
party
compu
tation
Proposed
method
can be
applied
for a
large
number
of
statistical
computat
ions
---
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1540
CONCLUSIONS
In this survey we have studied the some of the
work done by the researchers on the medical data
sharing in cloud in detail, also listed some their
advantages and disadvantages. By this study we can
conclude that there must be a system which will solve
the issues in the present systems.
REFERENCES
[1] Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang, Shiwen
Mao, Long Hu, “Privacy Protection and Intrusion
Avoidance for Cloudlet-based Medical Data Sharing”,
IEEE Transactions on Cloud Computing, 2016.
[2] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-
preserving multi-keyword ranked search over
encrypted cloud data,” Parallel andDistributedSystems,
IEEE Transactions on, vol. 25, no. 1, pp. 222-233, 2014.
[3] R. Lu, X. Lin, and X. Shen, “Spoc: A secure and privacy-
preserving opportunistic computing framework for
mobile-healthcare emergency,” Parallel andDistributed
Systems, IEEE Transactions on, vol. 24, no. 3, pp. 614-
624, 2013.
[4] J.-J. Yang, J. Li, J. Mulder, Y.Wang, S. Chen, H.Wu, Q.Wang,
and H. Pan, “Emerging information technologies for
enhanced healthcare,” Computers in Industry, vol. 69,
pp. 3-11, 2015.
[5] J.-J. Yang, J.-Q. Li, and Y. Niu, “A hybrid solution for
privacy preserving medical data sharing in the cloud
environment,” Future Generation Computer Systems,
vol. 43, pp. 74-86, 2015.
[6] A. Andersen, K. Y. Yigzaw, and R. Karlsen, “Privacy
preserving health data processing,” in e-Health
Networking, Applications and Services (Healthcom),
2014 IEEE 16th International Conference on. IEEE,
2014, pp. 225-230.
[7] K. Zhang, X. Liang, M. Baura, R. Lu, and X. S. Shen, “Phda:
A priority based health data aggregation with privacy
preservation for cloud assisted wbans,” Information
Sciences, vol. 284, pp. 130-141, 2014.
[8] K. Zhang, K. Yang, X. Liang, Z. Su, X. Shen, and H. H. Luo,
Security and privacy for mobile healthcare networks:
from a quality of protection perspective,” Wireless
Communications, IEEE, vol. 22, no. 4, pp. 104-112,2015.
Ms. Amruta R. Shete is
currently pursuing M.E
(Computer)from Dept of
Computer Engineering,
Jayawantrao SawantCollege of
Engineering, Pune,
Maharashtra, India -
411007.She received her B.E
(Computer) Degree from Vidya
Pratisthan’s College of
Engineering, Pune, India -
413133. Her area of interest is
Cloud Computing, Network
Security.
Asst. Prof. S. D. Satav received
his M.E (CSE/IT) degree from
the Department of Computer
Engineering, Vishwakarma
Institute of Technology,
Savitribai Phule Pune
University, Pune, Maharashtra,
India -411007 in 2004. He is
currently working as Asst.
Professor with Department of
Information Technology,
Jayawantrao Sawant College of
Engineering, Savitribai Phule
Pune University,
Pune,Maharashtra, India-
411007. His research interests
include Image Processing, and
Networking.
BIOGRAPHIES

More Related Content

What's hot

Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
IJMIT JOURNAL
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of Things
IJARIIT
 
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
IJET - International Journal of Engineering and Techniques
 
Review paper on Big Data in healthcare informatics
Review paper on Big Data in healthcare informaticsReview paper on Big Data in healthcare informatics
Review paper on Big Data in healthcare informatics
IRJET Journal
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
IJET - International Journal of Engineering and Techniques
 
IRJET- A Framework for Disease Risk Prediction
IRJET- A Framework for Disease Risk PredictionIRJET- A Framework for Disease Risk Prediction
IRJET- A Framework for Disease Risk Prediction
IRJET Journal
 
IRJET - A Survey on Blockchain Technology for Electronic Health Record
IRJET -  	  A Survey on Blockchain Technology for Electronic Health RecordIRJET -  	  A Survey on Blockchain Technology for Electronic Health Record
IRJET - A Survey on Blockchain Technology for Electronic Health Record
IRJET Journal
 
Framework for efficient transformation for complex medical data for improving...
Framework for efficient transformation for complex medical data for improving...Framework for efficient transformation for complex medical data for improving...
Framework for efficient transformation for complex medical data for improving...
IJECEIAES
 
IRJET - Data Mining and Machine Learning for Cyber Security
IRJET - Data Mining and Machine Learning for Cyber SecurityIRJET - Data Mining and Machine Learning for Cyber Security
IRJET - Data Mining and Machine Learning for Cyber Security
IRJET Journal
 
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET Journal
 
IRJET- A Survey on Big Data Frameworks and Approaches in Health Care Sector
IRJET- A Survey on Big Data Frameworks and Approaches in Health Care SectorIRJET- A Survey on Big Data Frameworks and Approaches in Health Care Sector
IRJET- A Survey on Big Data Frameworks and Approaches in Health Care Sector
IRJET Journal
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
IRJET Journal
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET Journal
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
ijscai
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosis
IRJET Journal
 
Medic - Artificially Intelligent System for Healthcare Services ...
Medic - Artificially Intelligent System for Healthcare Services              ...Medic - Artificially Intelligent System for Healthcare Services              ...
Medic - Artificially Intelligent System for Healthcare Services ...
IRJET Journal
 
Kr3618261830
Kr3618261830Kr3618261830
Kr3618261830
IJERA Editor
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing System
IRJET Journal
 

What's hot (19)

Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of Things
 
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
 
Review paper on Big Data in healthcare informatics
Review paper on Big Data in healthcare informaticsReview paper on Big Data in healthcare informatics
Review paper on Big Data in healthcare informatics
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
 
IRJET- A Framework for Disease Risk Prediction
IRJET- A Framework for Disease Risk PredictionIRJET- A Framework for Disease Risk Prediction
IRJET- A Framework for Disease Risk Prediction
 
IRJET - A Survey on Blockchain Technology for Electronic Health Record
IRJET -  	  A Survey on Blockchain Technology for Electronic Health RecordIRJET -  	  A Survey on Blockchain Technology for Electronic Health Record
IRJET - A Survey on Blockchain Technology for Electronic Health Record
 
Framework for efficient transformation for complex medical data for improving...
Framework for efficient transformation for complex medical data for improving...Framework for efficient transformation for complex medical data for improving...
Framework for efficient transformation for complex medical data for improving...
 
IRJET - Data Mining and Machine Learning for Cyber Security
IRJET - Data Mining and Machine Learning for Cyber SecurityIRJET - Data Mining and Machine Learning for Cyber Security
IRJET - Data Mining and Machine Learning for Cyber Security
 
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
 
IRJET- A Survey on Big Data Frameworks and Approaches in Health Care Sector
IRJET- A Survey on Big Data Frameworks and Approaches in Health Care SectorIRJET- A Survey on Big Data Frameworks and Approaches in Health Care Sector
IRJET- A Survey on Big Data Frameworks and Approaches in Health Care Sector
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosis
 
Medic - Artificially Intelligent System for Healthcare Services ...
Medic - Artificially Intelligent System for Healthcare Services              ...Medic - Artificially Intelligent System for Healthcare Services              ...
Medic - Artificially Intelligent System for Healthcare Services ...
 
Kr3618261830
Kr3618261830Kr3618261830
Kr3618261830
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing System
 

Viewers also liked

Microcontroller Based automatic AQUAPONICS SYSTEM
Microcontroller Based automatic AQUAPONICS SYSTEMMicrocontroller Based automatic AQUAPONICS SYSTEM
Microcontroller Based automatic AQUAPONICS SYSTEM
IRJET Journal
 
Portable voice communication system on raspberry pi
Portable voice communication system on raspberry piPortable voice communication system on raspberry pi
Portable voice communication system on raspberry pi
IRJET Journal
 
Design and analysis for supporting system of circular ESR for different seism...
Design and analysis for supporting system of circular ESR for different seism...Design and analysis for supporting system of circular ESR for different seism...
Design and analysis for supporting system of circular ESR for different seism...
IRJET Journal
 
Optimum design of braking system for a formula 3 race cars with numeric compu...
Optimum design of braking system for a formula 3 race cars with numeric compu...Optimum design of braking system for a formula 3 race cars with numeric compu...
Optimum design of braking system for a formula 3 race cars with numeric compu...
IRJET Journal
 
Design and demonstration of heat pipe based waste heat recovery system
Design and demonstration of heat pipe based waste heat recovery systemDesign and demonstration of heat pipe based waste heat recovery system
Design and demonstration of heat pipe based waste heat recovery system
IRJET Journal
 
Design and Analysis of Aqua Silencer
Design and Analysis of Aqua SilencerDesign and Analysis of Aqua Silencer
Design and Analysis of Aqua Silencer
IRJET Journal
 
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data FeedEfficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
IRJET Journal
 
Strength and geotechnical characterization of copper slag as partial replacem...
Strength and geotechnical characterization of copper slag as partial replacem...Strength and geotechnical characterization of copper slag as partial replacem...
Strength and geotechnical characterization of copper slag as partial replacem...
IRJET Journal
 
Recent Application and Future Development Scope in MEMS
Recent Application and Future Development Scope in MEMSRecent Application and Future Development Scope in MEMS
Recent Application and Future Development Scope in MEMS
IRJET Journal
 
Forward and Inverse Kinematic Analysis of Robotic Manipulators
Forward and Inverse Kinematic Analysis of Robotic ManipulatorsForward and Inverse Kinematic Analysis of Robotic Manipulators
Forward and Inverse Kinematic Analysis of Robotic Manipulators
IRJET Journal
 
Impact of delayness on construction projects
Impact of delayness on construction projectsImpact of delayness on construction projects
Impact of delayness on construction projects
IRJET Journal
 
A novel approach for solving Optimal Economic load dispatch problem in power ...
A novel approach for solving Optimal Economic load dispatch problem in power ...A novel approach for solving Optimal Economic load dispatch problem in power ...
A novel approach for solving Optimal Economic load dispatch problem in power ...
IRJET Journal
 
Adaptable D-STATCOM Performance as a Flexible Distributed Generation in Mit...
Adaptable D-STATCOM Performance as a Flexible   Distributed Generation in Mit...Adaptable D-STATCOM Performance as a Flexible   Distributed Generation in Mit...
Adaptable D-STATCOM Performance as a Flexible Distributed Generation in Mit...
IRJET Journal
 
Wireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile ChargingWireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile Charging
IRJET Journal
 
Fabrication of CVT operated bike
Fabrication of CVT operated bikeFabrication of CVT operated bike
Fabrication of CVT operated bike
IRJET Journal
 
Modification of Material Handling Process Using Automated Guided Vehicle (AGV)
Modification of Material Handling Process Using Automated Guided Vehicle (AGV)Modification of Material Handling Process Using Automated Guided Vehicle (AGV)
Modification of Material Handling Process Using Automated Guided Vehicle (AGV)
IRJET Journal
 
Fabrication of automatic hydraulic bending and bend removing machine
Fabrication of automatic hydraulic bending and bend removing machineFabrication of automatic hydraulic bending and bend removing machine
Fabrication of automatic hydraulic bending and bend removing machine
IRJET Journal
 
A review paper on closed loop control of bldc motor using fuzzy logic
A review paper on closed loop control of bldc motor using fuzzy logicA review paper on closed loop control of bldc motor using fuzzy logic
A review paper on closed loop control of bldc motor using fuzzy logic
IRJET Journal
 
Free vibration analysis on cantilever beam-A review
Free vibration analysis on cantilever beam-A reviewFree vibration analysis on cantilever beam-A review
Free vibration analysis on cantilever beam-A review
IRJET Journal
 
IOT Based Water Level Monitoring System For Lake
IOT Based Water Level Monitoring System For LakeIOT Based Water Level Monitoring System For Lake
IOT Based Water Level Monitoring System For Lake
IRJET Journal
 

Viewers also liked (20)

Microcontroller Based automatic AQUAPONICS SYSTEM
Microcontroller Based automatic AQUAPONICS SYSTEMMicrocontroller Based automatic AQUAPONICS SYSTEM
Microcontroller Based automatic AQUAPONICS SYSTEM
 
Portable voice communication system on raspberry pi
Portable voice communication system on raspberry piPortable voice communication system on raspberry pi
Portable voice communication system on raspberry pi
 
Design and analysis for supporting system of circular ESR for different seism...
Design and analysis for supporting system of circular ESR for different seism...Design and analysis for supporting system of circular ESR for different seism...
Design and analysis for supporting system of circular ESR for different seism...
 
Optimum design of braking system for a formula 3 race cars with numeric compu...
Optimum design of braking system for a formula 3 race cars with numeric compu...Optimum design of braking system for a formula 3 race cars with numeric compu...
Optimum design of braking system for a formula 3 race cars with numeric compu...
 
Design and demonstration of heat pipe based waste heat recovery system
Design and demonstration of heat pipe based waste heat recovery systemDesign and demonstration of heat pipe based waste heat recovery system
Design and demonstration of heat pipe based waste heat recovery system
 
Design and Analysis of Aqua Silencer
Design and Analysis of Aqua SilencerDesign and Analysis of Aqua Silencer
Design and Analysis of Aqua Silencer
 
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data FeedEfficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
 
Strength and geotechnical characterization of copper slag as partial replacem...
Strength and geotechnical characterization of copper slag as partial replacem...Strength and geotechnical characterization of copper slag as partial replacem...
Strength and geotechnical characterization of copper slag as partial replacem...
 
Recent Application and Future Development Scope in MEMS
Recent Application and Future Development Scope in MEMSRecent Application and Future Development Scope in MEMS
Recent Application and Future Development Scope in MEMS
 
Forward and Inverse Kinematic Analysis of Robotic Manipulators
Forward and Inverse Kinematic Analysis of Robotic ManipulatorsForward and Inverse Kinematic Analysis of Robotic Manipulators
Forward and Inverse Kinematic Analysis of Robotic Manipulators
 
Impact of delayness on construction projects
Impact of delayness on construction projectsImpact of delayness on construction projects
Impact of delayness on construction projects
 
A novel approach for solving Optimal Economic load dispatch problem in power ...
A novel approach for solving Optimal Economic load dispatch problem in power ...A novel approach for solving Optimal Economic load dispatch problem in power ...
A novel approach for solving Optimal Economic load dispatch problem in power ...
 
Adaptable D-STATCOM Performance as a Flexible Distributed Generation in Mit...
Adaptable D-STATCOM Performance as a Flexible   Distributed Generation in Mit...Adaptable D-STATCOM Performance as a Flexible   Distributed Generation in Mit...
Adaptable D-STATCOM Performance as a Flexible Distributed Generation in Mit...
 
Wireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile ChargingWireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile Charging
 
Fabrication of CVT operated bike
Fabrication of CVT operated bikeFabrication of CVT operated bike
Fabrication of CVT operated bike
 
Modification of Material Handling Process Using Automated Guided Vehicle (AGV)
Modification of Material Handling Process Using Automated Guided Vehicle (AGV)Modification of Material Handling Process Using Automated Guided Vehicle (AGV)
Modification of Material Handling Process Using Automated Guided Vehicle (AGV)
 
Fabrication of automatic hydraulic bending and bend removing machine
Fabrication of automatic hydraulic bending and bend removing machineFabrication of automatic hydraulic bending and bend removing machine
Fabrication of automatic hydraulic bending and bend removing machine
 
A review paper on closed loop control of bldc motor using fuzzy logic
A review paper on closed loop control of bldc motor using fuzzy logicA review paper on closed loop control of bldc motor using fuzzy logic
A review paper on closed loop control of bldc motor using fuzzy logic
 
Free vibration analysis on cantilever beam-A review
Free vibration analysis on cantilever beam-A reviewFree vibration analysis on cantilever beam-A review
Free vibration analysis on cantilever beam-A review
 
IOT Based Water Level Monitoring System For Lake
IOT Based Water Level Monitoring System For LakeIOT Based Water Level Monitoring System For Lake
IOT Based Water Level Monitoring System For Lake
 

Similar to Survey on Medical Data Sharing Systems with NTRU

IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
IRJET Journal
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
IRJET Journal
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET Journal
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
IRJET Journal
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
YogeshIJTSRD
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
IJERA Editor
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
IRJET Journal
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
IRJET Journal
 
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET Journal
 
Using Real Time Communication Provide Emergency Treatment and Hospital Search...
Using Real Time Communication Provide Emergency Treatment and Hospital Search...Using Real Time Communication Provide Emergency Treatment and Hospital Search...
Using Real Time Communication Provide Emergency Treatment and Hospital Search...
IRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
IRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
IRJET Journal
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
KSAravindSrivastava
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
IRJET Journal
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
IRJET Journal
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
IJERA Editor
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
IRJET Journal
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Journals
 

Similar to Survey on Medical Data Sharing Systems with NTRU (20)

IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
 
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
 
Using Real Time Communication Provide Emergency Treatment and Hospital Search...
Using Real Time Communication Provide Emergency Treatment and Hospital Search...Using Real Time Communication Provide Emergency Treatment and Hospital Search...
Using Real Time Communication Provide Emergency Treatment and Hospital Search...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine, Issue 49 / Spring 2024Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
dulbh kashyap
 
🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...
🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...
🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...
AK47
 
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort ServiceCuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
yakranividhrini
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Poonam Singh
 
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC ConduitThe Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
Guangdong Ctube Industry Co., Ltd.
 
CSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdfCSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdf
Ismail Sultan
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Dr.Costas Sachpazis
 
Data Communication and Computer Networks Management System Project Report.pdf
Data Communication and Computer Networks Management System Project Report.pdfData Communication and Computer Networks Management System Project Report.pdf
Data Communication and Computer Networks Management System Project Report.pdf
Kamal Acharya
 
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
simrangupta87541
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
LokerXu2
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
EMERSON EDUARDO RODRIGUES
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
ShivangMishra54
 
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
sexytaniya455
 
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
dABGO KI CITy kUSHINAGAR Ak47
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
ShurooqTaib
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book NowKandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
SONALI Batra $A12
 
Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...
Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...
Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...
shourabjaat424
 
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call GirlCall Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
sapna sharmap11
 

Recently uploaded (20)

Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine, Issue 49 / Spring 2024Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine, Issue 49 / Spring 2024
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
 
🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...
🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...
🔥Independent Call Girls In Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Esco...
 
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort ServiceCuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
 
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC ConduitThe Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
 
CSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdfCSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdf
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
 
Data Communication and Computer Networks Management System Project Report.pdf
Data Communication and Computer Networks Management System Project Report.pdfData Communication and Computer Networks Management System Project Report.pdf
Data Communication and Computer Networks Management System Project Report.pdf
 
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
 
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
 
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book NowKandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
 
Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...
Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...
Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...
 
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call GirlCall Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
 

Survey on Medical Data Sharing Systems with NTRU

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1537 Survey on Medical Data Sharing Systems with NTRU Amruta Shete R1, S.D.Satav2 1 ME Computer Engineering, Jayawantrao Sawant College of Engineering, Hadapsar Pune-28, Savitribai Phule Pune University, Pune, India 2 Assistant Professor, Information Technology, Jayawantrao Sawant College of Engineering, Hadapsar Pune-28, Savitribai Phule Pune University, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Health Record of an individual personalisavitalwaythatcan be utilized for keeping track of the patient data in accurate, reliable as well as complete manner. The sharing of health records permits the patient to make andredesigntheir details, furthermore, share their data with various users as well as medicinal services suppliers. While sharing the healthcare data in the cloud, the clients have handled a few issues, for example, security, scalable key managements, userrevocation and flexible access controls. This survey gives a study on various techniques created for sharing of medical data using cloud and by analyzing they enlisted their pros and cons. Key Words: Security, data sharing, collaborative intrusion detection system (IDS), healthcare, NTRU. I. INTRODUCTION Cloud Computing is the one of the popular technology in IT that provides various services to the user via Internet. Cloud system empowers the information sharing system which gives the variety of services to the user. According to the studies all the companies shares 74% of their information with the users as well as 64% if their information with the suppliers using cloud storage system. In this way sharing of data is the higher priority task which plays an important role in any organizationbywhichtheproductivityinthecloud environment is increased. The shared cloud services are effectively available by the on-request network access service as well as it is adaptable which is accessible at lower cost. At the time of the sharing of information the medical information or data sharing assumes a fundamental part in light of the fact that the patient data's are effortlessly open with least cost. In day to day life the health record of the person is trading technology in applications of medical that are utilized for generating, managing as well as modifying the health data related to the patient in very effective way. The health records of the personal has different data related to the patient such as identification sheet, issues, medical records, progress notes, details of consultation, lab reports, immunization records, consent forms, imagingandx-rayreportsetc.Suchdata records must be stored on the cloud for the sharing as well asaccessmechanismthatisutilizedforcontrolling the activities of the patient. In the personal health record, sharing of the data is fine-grained access control, security, data confidentiality, authorization and authentication is crucial challenge while sharing the personal health records in the third party storage. At the time of uploading of personal health care datain the cloud the owner of data losses the physical control also it can be hacked by hackers. Hence the providing the security is a big issue while sharingpersonalhealth care data in cloud environment. This can be solved by usingencryptionmechanismatthetimeofdatasharing that will increase the confidentiality of the data as well as information security in the third party storage service. By making use of several encryption techniques user can store the data on cloud without worrying about the security. In the next segment we will go through some of the researches provided the different authors on Medical Data Sharing Systems. II. LITERATURE REVIEW In paper [1] author build up a novel healthcare system by utilizing the flexibility of cloudlet. The functions of cloudlet consist of privacy protection,datasharingand intrusion detection. In the stage of data collection, firstly utilize Number Theory Research Unit (NTRU) method to encrypt user as body data collected by wearable devices. Those data will be end to nearby cloudlet in an energy efficient fashion. Secondly,
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1538 present a new trust model to help users to select trustable partners whowanttosharestoreddatainthe cloudlet. The trust model also helps identical patients to communicate with each other about their diseases. Thirdly, divide users medical data stored in remote cloud of hospital into three parts,andgivethemproper protection. Finally, in order to protect the healthcare system from malicious attacks, design a novel collaborative intrusion detection system(IDS)method dependoncloudletmesh,whichcaneffectivelyprevent the remote healthcare big data cloud from attacks. In this paper [2], for the first time, define and solve the challenging issue of privacy preservingmulti-keyword ranked search overencryptedclouddata(MRSE).They establish a set of strict privacy requirements for sucha secure cloud data utilization system. Among various multi-keyword semantics, they choose the efficient similarity measure of “coordinate matching”, i.e., as many matches as possible, to capture the relevance of data documents to the search query. They further use “inner product similarity” to quantitatively evaluate such similarity measure. First propose a basic idea for the MRSE based on secure inner product computation, and then give two significantly improved MRSE schemes to achieve various stringent privacy requirementsintwodifferentthreatmodels.Thorough study of inspectingprivacyandefficiencyguaranteesof proposed schemes is given. In this paper [3], author developed a secure and privacy-preserving opportunistic computing framework, called SPOC, for m-Healthcare emergency. With SPOC, smart phone resources involving computing power and energy can be opportunistically collected to process the computing-intensive personal health information (PHI) during m-Healthcare emergencywithminimalprivacydisclosure.Inspecific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m- Healthcare emergency, They introduce an efficient user-centricprivacyaccesscontrolinSPOCframework, which is depend on an attribute-based access control and a new privacy preserving scalar product computation(PPSPC)technique,andpermitsamedical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security study display that the proposedSPOCframeworkcanefficientlyachieveuser- centric privacy access control in mHealthcare emergency. This paper [4] first introduces the main aim of this special issue and gives a brief guideline. Then, the present situation of the adoption of EMRs is reviewed. After that, the emerging data technologies are presented which have a great impact on thehealthcare provision. These include health sensing for medical data collection, medical data study and utilization for accurate detection and prediction. Next, cloud computing is discussed, as it may offer scalable and cost-effective delivery of healthcare services. This paper [5] developed a practical solution for privacy preserving medical record sharing for cloud computing. On the basis of the classification of the attributes of medical records, they use vertical partition of medical dataset to achieve the consideration of distinct parts of medical information with different privacy concerns. It mainly consisting four components, i.e., (1) vertical data partition for medical informationpublishing,(2)datacombiningfor medical dataset accessing, (3) integrity checking, and (4) hybrid search across plaintext and ciphertext, where the statistical analysis and cryptography are innovatively combined together to provide multiple paradigms of balance among medical data utilization and privacy protection. A prototype system for the huge scale medical data access and distributing is implemented. The usage of electronic health data from distinct sources for statistical analysis requiresatoolset where the legal, security and privacy concerns have been taken into consideration. The health data are typically placed at different general practices and hospitals.The data analysis includes of local processing at these locations, and the locations become nodes in a computing graph. To support the legal, security and privacy
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1539 concerns, the proposed [6] toolset for statistical study of health data uses a combinationofsecuremulti-party computation (SMC) algorithms, symmetric and public key encryption, and public key infrastructure (PKI) with certificates and a certificate authority (CA). The proposed toolset should cover a wide range of data analysis with different data distributions. To accomplish this, huge set of possible SMC algorithms and computing graphs have to be supported. In this paper [7],authorproposeaprioritybasedhealth data aggregation (PHDA) scheme with privacy preservation for cloud assisted WBANs to improve the aggregation efficiency between different types of health data. Specifically, first explore social spots to help forward health data and enable users to selectthe optimal relay according to their social ties. According to distinct data priorities, the adjustable forwarding methods can be selected to forward the user as health data to the cloud servers with the reasonable communication overheads. The security analysis describes that the PHDA can achieve identity and data privacy preservation, and resists the forgery attacks. In this article [8], investigate security and privacy protection in MHNs fromtheperspectiveofQoP,which offers users adjustable security protections at fine- grained levels. Specifically, first introduce the architecture of MHN, and point out the security and privacy limitations from the perspective of QoP. Then present some countermeasures for security and privacy protection in MHNs, consisting privacy- preserving health data aggregation, secure health data processing, and misbehavior detection. Table 1: Survey Table S r. N o Title Paper Details Met hod Used Advan tages Disadvant ages 1. Privacy Protectio n and Intrusion Avoidanc e for Cloudlet- based Medical Data Sharing healthcare system by utilizing the flexibility of cloudlet Numbe r Theory Resear ch Unit Effectivel y prevent the remote healthcar e big data cloud from attacks. --- 2. Privacy- preservin g multi- keyword ranked search over encrypte d cloud data Privacy preserving multi- keyword ranked search over encrypted cloud data (MRSE). coordi nate matchi ng Introduce low overhead on both computati on and communi cation. Integrity of the rank order in the search result assuming the cloud server is untrusted. 3. Spoc: A secure and privacy- preservin g opportun istic computin g framewo rk for mobile- healthcar e emergen cy developed a secure and privacy- preserving opportunist ic computing framework, called SPOC attribu te- based access control achieve the efficient user- centric privacy access control Can carry on Smartphone- based experiments to verify the effectiveness of the SPOC framework. 4. Emerging informati on technolo gies for enhanced healthcar e adoption of EMRs is reviewed cloud comput ing is discuss ed Shown that the cloud can be used for medical health care records storage Does not cover all the aspects and applications 5. Privacy preservin g health data processin g Proposed toolset for statistical study of health data uses a combinatio n of secure multi-party computatio n (SMC) algorithms a combi nation of secure multi- party compu tation Proposed method can be applied for a large number of statistical computat ions ---
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1540 CONCLUSIONS In this survey we have studied the some of the work done by the researchers on the medical data sharing in cloud in detail, also listed some their advantages and disadvantages. By this study we can conclude that there must be a system which will solve the issues in the present systems. REFERENCES [1] Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang, Shiwen Mao, Long Hu, “Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing”, IEEE Transactions on Cloud Computing, 2016. [2] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy- preserving multi-keyword ranked search over encrypted cloud data,” Parallel andDistributedSystems, IEEE Transactions on, vol. 25, no. 1, pp. 222-233, 2014. [3] R. Lu, X. Lin, and X. Shen, “Spoc: A secure and privacy- preserving opportunistic computing framework for mobile-healthcare emergency,” Parallel andDistributed Systems, IEEE Transactions on, vol. 24, no. 3, pp. 614- 624, 2013. [4] J.-J. Yang, J. Li, J. Mulder, Y.Wang, S. Chen, H.Wu, Q.Wang, and H. Pan, “Emerging information technologies for enhanced healthcare,” Computers in Industry, vol. 69, pp. 3-11, 2015. [5] J.-J. Yang, J.-Q. Li, and Y. Niu, “A hybrid solution for privacy preserving medical data sharing in the cloud environment,” Future Generation Computer Systems, vol. 43, pp. 74-86, 2015. [6] A. Andersen, K. Y. Yigzaw, and R. Karlsen, “Privacy preserving health data processing,” in e-Health Networking, Applications and Services (Healthcom), 2014 IEEE 16th International Conference on. IEEE, 2014, pp. 225-230. [7] K. Zhang, X. Liang, M. Baura, R. Lu, and X. S. Shen, “Phda: A priority based health data aggregation with privacy preservation for cloud assisted wbans,” Information Sciences, vol. 284, pp. 130-141, 2014. [8] K. Zhang, K. Yang, X. Liang, Z. Su, X. Shen, and H. H. Luo, Security and privacy for mobile healthcare networks: from a quality of protection perspective,” Wireless Communications, IEEE, vol. 22, no. 4, pp. 104-112,2015. Ms. Amruta R. Shete is currently pursuing M.E (Computer)from Dept of Computer Engineering, Jayawantrao SawantCollege of Engineering, Pune, Maharashtra, India - 411007.She received her B.E (Computer) Degree from Vidya Pratisthan’s College of Engineering, Pune, India - 413133. Her area of interest is Cloud Computing, Network Security. Asst. Prof. S. D. Satav received his M.E (CSE/IT) degree from the Department of Computer Engineering, Vishwakarma Institute of Technology, Savitribai Phule Pune University, Pune, Maharashtra, India -411007 in 2004. He is currently working as Asst. Professor with Department of Information Technology, Jayawantrao Sawant College of Engineering, Savitribai Phule Pune University, Pune,Maharashtra, India- 411007. His research interests include Image Processing, and Networking. BIOGRAPHIES
  翻译: