You can view the full text of this article for free using the link below.

Title: Multi cloud-based secure privacy preservation of hospital data in cloud computing

Authors: S. Kanaga Suba Raja; A. Sathya; S. Karthikeyan; T. Janane

Addresses: Department of Information Technology, Easwari Engineering College, Chennai, India ' Department of Information Technology, Easwari Engineering College, Chennai, India ' Department of Information Technology, Easwari Engineering College, Chennai, India ' Department of Information Technology, Easwari Engineering College, Chennai, India

Abstract: The growth of cloud computing has led to privacy concerns abundantly. Any organisation/user sends all the information to the cloud service provider and so the organisation's/user's data security is a concern. Data privacy and security issues can be solved by establishing clear policies that enable authorised data access and security. User authentication is the primary basis for access control and so using cryptographic encryption mechanism like key policy attribute-based encryption we can provide strong authentication to ensure that data can be viewed by only who have to access it. Followed by which a never compromised integrity mechanism like SHA-256 hash mechanism is used to ensure that data is not modified in transit. These hashes are concatenated in a way to form top hash by structuring in a Merkle hash tree. They are used by the erasure code to find lost data during any of the crashes. To make it efficient and to find the data loss, third party auditors are installed to check and report any changes in any of the cloud storage. Data recovery is by means of retrieving the data from another cloud that has the replica of these data.

Keywords: multi cloud; key policy attribute-based encryption; MHT; erasure code; third party auditor.

DOI: 10.1504/IJCC.2021.113993

International Journal of Cloud Computing, 2021 Vol.10 No.1/2, pp.101 - 111

Received: 17 Sep 2019
Accepted: 09 Jan 2020

Published online: 15 Mar 2021 *

Full-text access for editors Access for subscribers Free access Comment on this article