Open Access   Article Go Back

Privacy Preserving Using AES-Mapping in Mix Column Encryption Algorithm: Cloud Approach

Anjali Kumari1 , Varsha Namdeo2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-9 , Page no. 201-206, Sep-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i9.201206

Online published on Sep 30, 2019

Copyright © Anjali Kumari, Varsha Namdeo . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anjali Kumari, Varsha Namdeo, “Privacy Preserving Using AES-Mapping in Mix Column Encryption Algorithm: Cloud Approach,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.9, pp.201-206, 2019.

MLA Style Citation: Anjali Kumari, Varsha Namdeo "Privacy Preserving Using AES-Mapping in Mix Column Encryption Algorithm: Cloud Approach." International Journal of Computer Sciences and Engineering 7.9 (2019): 201-206.

APA Style Citation: Anjali Kumari, Varsha Namdeo, (2019). Privacy Preserving Using AES-Mapping in Mix Column Encryption Algorithm: Cloud Approach. International Journal of Computer Sciences and Engineering, 7(9), 201-206.

BibTex Style Citation:
@article{Kumari_2019,
author = {Anjali Kumari, Varsha Namdeo},
title = {Privacy Preserving Using AES-Mapping in Mix Column Encryption Algorithm: Cloud Approach},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2019},
volume = {7},
Issue = {9},
month = {9},
year = {2019},
issn = {2347-2693},
pages = {201-206},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4877},
doi = {https://doi.org/10.26438/ijcse/v7i9.201206}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i9.201206}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4877
TI - Privacy Preserving Using AES-Mapping in Mix Column Encryption Algorithm: Cloud Approach
T2 - International Journal of Computer Sciences and Engineering
AU - Anjali Kumari, Varsha Namdeo
PY - 2019
DA - 2019/09/30
PB - IJCSE, Indore, INDIA
SP - 201-206
IS - 9
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
325 234 downloads 192 downloads
  
  
           

Abstract

In this paper we evaluate the efficient, scalable and practical method for privacy-preserving using k-nearest neighbors (KNN) classification method for EMR data. The approach enables performing the widely used k-NN classification method in complex scenarios where none of the parties reveal their information while they can still cooperatively find the nearest matches. To development AES- S.BOX mapping in mix column privacy preserving model used for preserving the privacy of the patients data in a cloud assisted system as the complex information is needed to be maintained confidential and should not be revealed to public users other than the physicians. As we know AES is based on several mathematical perform for security purpose substitutions, permutation and transformation.

Key-Words / Index Term

Cloud approach, privacy preserving, S.BOX mapping in mix column, KNN, MATLAB 2014a

References

[1] A. Andoni and P. Indyk. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In FOCS, 2006.
[2] M. Bellare, V. Tung Hoang, Sriram K., and P. Rogaway. Efficient garbling from a fixed-key block cipher. In S&P. IEEE, 2013.
[3] J. Boyar and R. Peralta “Concrete multiplicative complexity of symmetric functions in MFCS” Springer, 2006
[4] Brenner, perl, and Smith. hcrypt Secure Function Evaluation (SFE) project. https://hcrypt.com/sfe/.
[5] H. Carter, C. Lever, and P. Traynor. Whitewash: Outsourcing garbled circuit generation for mobile devices. In ACSAC. ACM, 2014.
[6] H. Carter, B. Mood, P. Traynor, and K. Butler. Secure outsourced garbled circuit evaluation for mobile phones. In USENIX Security. USENIX, 2013.
[7] D. Demmler, T. Schneider, and M. Zohner. Ad-hoc secure two-party computation on mobile devices using hardware tokens. In USENIX Security. USENIX, 2014.
[8] C. Gentry. “Fully homomorphic encryption using ideal lattices”. In STOC, 2009.
[9] A. Bessani, M. Correia, B. Quaresma, F. Andr´e, and P. Sousa, “Depsky: Dependable and secure storage in a cloud-of-clouds,” in Proceedings of the Sixth Conference on Computer Systems, 2011, pp. 31–46.
[10] E. Stefanov, M. van Dijk, A. Juels, and A. Oprea, “Iris: A scalable cloud file system with efficient integrity checks,” in Proceedings of the 28th Annual Computer Security Applications Conference, 2012, pp. 229–238.
[11] Y. Chen and R. Sion, “On securing untrusted clouds with cryptography,” in Proceedings of the 9th annual ACM workshop on Privacy in the electronic society. ACM, 2010, pp. 109– 114.
[12] R. Laurikainen, “Secure and anonymous communication in the cloud,” Aalto University School of Science and Technology, Department of Computer Science and Engineering, Tech. Rep. TKK-CSE-B10, 2010.
[13] Sushmita Ruj, Milos Stojmenovic and Amiya Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds”in proceedings of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
[14] Debajyoti Mukhopadhyay, Gitesh Sonawane, Parth Sarthi Gupta, Sagar Bhavsar, Vibha Mittal.” Enhanced Security for Cloud Storage using File Encryption” Department of Information Technology Maharashtra Institute of Technology
[15] Kawser Wazed Nafi1,2, Tonny Shekha Kar2, Sayed Anisul Hoque3, Dr. M. M. A Hashem4, “ A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture”in proceeding of the (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2011
[16] Du meng.” Data security in cloud computing” in yhe proceeding of the The 8th International Conference on Computer Science & Education (ICCSE 2013) April 26-28, 2013. Colombo, Sri Lanka