Paper Title : Sensitive Based Privacy Preserving on Shared Data in Cloud using Reversible Data Hiding with Encryption
ISSN : 2394-2231
Year of Publication : 2021
10.29126/23942231/IJCT-v8i2p42
MLA Style: C.Surya, V.Kalaivani, K.Kaviya, T.Thangamathi " Sensitive Based Privacy Preserving on Shared Data in Cloud using Reversible Data Hiding with Encryption " Volume 8 - Issue 2 March-April , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: C.Surya, V.Kalaivani, K.Kaviya, T.Thangamathi " Sensitive Based Privacy Preserving on Shared Data in Cloud using Reversible Data Hiding with Encryption " Volume 8 - Issue 2 March-April , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Abstract
The patient health record maintenance is sensitive and crucial task in health care sectors. The patient medical care records are stored in a huge data set; it can be stored, maintained and traced every day. The objective of this project is to store patient’s health reports safely. In Existing, Cryptographic-based encryption is to encrypt data into unreadable code; it is more likely to attract the attacker's attention. Once these ciphertext is intercepted, the attacker will try to decrypt these ciphertext to obtain some useful information, so as to carry out some illegal activities. Some health care information not only have high requirements for privacy protection, but also want to be able to express their preference in the decisionmaking of privacy protection, so they may want to define what information is sensitive to them and what is not. The proposed model can classify the data into sensitive data and non-sensitive data according to the user's preferences with SVM (Support Vector Machine) based machine learning classification. Since nonsensitive data pose no threat to user privacy, it can be transmitted directly on ordinary channels without being processed. While, sensitive data need to be processed before it can be transmitted. In terms of sensitive data processing, here proposes a method of combining data encryption with information hiding. Sensitive data are encrypted using Advanced Encryption Standard (AES) encryption algorithm before it can be transmitted, making it to unreadable code. Then, a novel information hiding method proposed, named the Modified LSB (MLSB) information hiding method is used to provide a second guarantee for the security of sensitive data. In other words, the sensitive information is hidden in the multimedia carrier, so that the adversary cannot notice the existence of sensitive information.
Reference
[1] Patel, Arpit, and Tushar A. Champaneria. "Fuzzy logic based algorithm for Context Awareness in IoT for Smart home environment." In 2016 IEEE Region 10 Conference (TENCON), pp. 1057-1060. IEEE, 2016 [2] Mehrotra, Sharad, Alfred Kobsa, Nalini Venkatasubramanian, and Siva Raj Rajagopalan. "TIPPERS: A privacy cognizant IoT environment." In 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1-6. IEEE, 2016. [3] Keshavarz, Mahsa, and Mohd Anwar. "Towards improving privacy control for smart homes: A privacy decision framework." In 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1-3. IEEE, 2018. [4] She, W. E. I., Zhi-Hao Gu, Xu-Kang Lyu, Q. I. Liu, Zhao Tian, and Wei Liu. "Homomorphic consortium blockchain for smart home system sensitive data privacy preserving." IEEE Access 7 (2019): 62058-62070. [5] Zhou, Zhili, Huiyu Sun, Rohan Harit, Xianyi Chen, and Xingming Sun. "Coverless image steganography without embedding." In International Conference on Cloud Computing and Security, pp. 123-132. Springer, Cham, 2015. [6] Bilal, Muhammad, Sana Imtiaz, Wadood Abdul, Sanaa Ghouzali, and Shahzad Asif. "Chaos based Zerosteganography algorithm." Multimedia tools and applications 72, no. 2 (2014): 1073-1092. [7] Zheng, Shuli, Liang Wang, Baohong Ling, and Donghui Hu. "Coverless information hiding based on robust image hashing." In International Conference on Intelligent Computing, pp. 536-547. Springer, Cham, 2017 [8] Zou, Liming, Jiande Sun, Min Gao, Wenbo Wan, and Brij Bhooshan Gupta. "A novel coverless information hiding method based on the average pixel value of the sub-images." Multimedia tools and applications 78, no. 7 (2019): 7965-7980. [9] Chen, Min. "Towards smart city: M2M communications with software agent intelligence." Multimedia Tools and Applications 67, no. 1 (2013): 167-178. [10] Qin, Jun, and Zhong-Shi He. "A SVM face recognition method based on Gabor-featured key points." In 2005 international conference on machine learning and cybernetics, vol. 8, pp. 5144-5149. IEEE, 2005 [11] Yang, Yi, Min Shao, Sencun Zhu, and Guohong Cao. "Towards statistically strong source anonymity for sensor networks." ACM Transactions on Sensor Networks (TOSN) 9, no. 3 (2013): 1-23. [12] Sianaki, Omid Ameri, and Mohammad AS Masoum. "A fuzzy TOPSIS approach for home energy management in smart grid with considering householders' preferences." In 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), pp. 1-6. IEEE, 2013. [13] Yadav, Er Pooja, Er Ankur Mittal, and Hemant Yadav. "IoT: Challenges and issues in indian perspective." In 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU), pp. 1-5. IEEE, 2018
Keywords
———privacy, sensitive data, machine learning, fuzzy logic, data hiding and extraction.