Advertisement

Secure Storage and Accessing of Organ Donor Details

  • A. GeethaEmail author
  • R. M. Ishwarya
  • R. Karthik
Conference paper
  • 11 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1056)

Abstract

The area cloud computing itself is a very vast domain with increasing new technologies each day. Here, an online organ donation system is developed with the help of the aforementioned technologies. The main aim of the project is to make sure that the organs of the people, who have come forward to donate, reach the respective individual in need of the particular organ. Since everything is stored in the cloud, anybody can access it anytime, which in turn puts the data at risk. The secured sharing of donor details is necessary. Encryption is done at two levels to provide security, one while the data are entered and the other done by a third party providing proxy re-encryption. Now, when a patient in the hospital has been declared dead after thorough verification for any complications, based on the deciding parameters such as the organs that can be transplanted, blood group, HIV status, and location, a comparison is done with the cloud database using query filtering, which results in the nearest recipient available meeting the requirements. The performance enhancement of cloud data using encryption schemes is of high potential.

Keywords

Cloud computing Proxy re-encryption Query filter Cloud database Encryption 

References

  1. 1.
    Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(1), 1182–1191 (2013)CrossRefGoogle Scholar
  2. 2.
    Dutta, P., Mukherjee, T., Hegde, V.G., Guhar, S.: C-Cloud: a cost-efficient reliable cloud for surplus computing resources. In: IEEE 7th International Conference on Cloud Computing, Sept., pp. 986–987 (2014)Google Scholar
  3. 3.
    Li, K., Zhang, W., Yang, C., Yu, N.: Security analysis on one-to-many order preserving encryption based cloud data search. IEEE Trans. Inf. Forensics Secur. 10(9), 1918–1926 (2015)Google Scholar
  4. 4.
    Chen, B.H.K., Cheung, P.Y.S., Cheung, P.Y.K., Kwok, Y.-K.: Cyber DB: a novel architecture for outsourcing secure database processing. IEEE Trans. Cloud Comput. 6(2) (2016)Google Scholar
  5. 5.
    Zhou, L., Varadharajan, V., Gopinath, K.: A secure role-based cloud storage system for encrypted patient-centric health records. IEEE J. Comput. 59(11), 1245–1257 (2016)CrossRefGoogle Scholar
  6. 6.
    Sallam, A.I., Faragallah, O.S., El-Rabaie, E.-S.M.: HEVC selective encryption using RC6 block cipher technique. IEEE Trans. Multimed. 20(7), 1636–1644 (2017)CrossRefGoogle Scholar
  7. 7.
    Ali, M., Abbas, A., Khan, M.U.S., Khan, S.U.: SeSPHR: a methodology for secure sharing of personal health records on cloud. IEEE Trans. Cloud Comput. 14(8), 1–1 (2018)Google Scholar
  8. 8.
    Lin, C., Kumar, A.: Matching contactless and contact-based conventional fingerprint images for biometrics identification. IEEE Trans. Image Process. 27(12), 2008–2021 (2018)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringEaswari Engineering CollegeChennaiIndia

Personalised recommendations