Secure Storage and Accessing of Organ Donor Details
- 11 Downloads
The area cloud computing itself is a very vast domain with increasing new technologies each day. Here, an online organ donation system is developed with the help of the aforementioned technologies. The main aim of the project is to make sure that the organs of the people, who have come forward to donate, reach the respective individual in need of the particular organ. Since everything is stored in the cloud, anybody can access it anytime, which in turn puts the data at risk. The secured sharing of donor details is necessary. Encryption is done at two levels to provide security, one while the data are entered and the other done by a third party providing proxy re-encryption. Now, when a patient in the hospital has been declared dead after thorough verification for any complications, based on the deciding parameters such as the organs that can be transplanted, blood group, HIV status, and location, a comparison is done with the cloud database using query filtering, which results in the nearest recipient available meeting the requirements. The performance enhancement of cloud data using encryption schemes is of high potential.
KeywordsCloud computing Proxy re-encryption Query filter Cloud database Encryption
- 2.Dutta, P., Mukherjee, T., Hegde, V.G., Guhar, S.: C-Cloud: a cost-efficient reliable cloud for surplus computing resources. In: IEEE 7th International Conference on Cloud Computing, Sept., pp. 986–987 (2014)Google Scholar
- 3.Li, K., Zhang, W., Yang, C., Yu, N.: Security analysis on one-to-many order preserving encryption based cloud data search. IEEE Trans. Inf. Forensics Secur. 10(9), 1918–1926 (2015)Google Scholar
- 4.Chen, B.H.K., Cheung, P.Y.S., Cheung, P.Y.K., Kwok, Y.-K.: Cyber DB: a novel architecture for outsourcing secure database processing. IEEE Trans. Cloud Comput. 6(2) (2016)Google Scholar
- 7.Ali, M., Abbas, A., Khan, M.U.S., Khan, S.U.: SeSPHR: a methodology for secure sharing of personal health records on cloud. IEEE Trans. Cloud Comput. 14(8), 1–1 (2018)Google Scholar