Online ISSN: 2515-8260

Keywords : Cloud Computing

A Survey on Blockchain Security System and Proactive Integrity Proofing Model in Centralized Cloud Environment


European Journal of Molecular & Clinical Medicine, 2022, Volume 9, Issue 7, Pages 8374-8387

Blockchain technology impact of security is a huge development on many businesses based on secured information processing, transactions, and safety to make in communication, and it still affects many places, due to what it can do for privacy levels. Although the characteristics of blockchain technology make security services in a centralized cloud environment, But most of the innovative technology doesn't provide standards security levels from service management. The development of blockchain leads to more security based on cryptographic issues. The exploration focuses on recent development challenges in the Blockchain security system and then summarizes the specific security threats. We consider some ideas in potential research directions based on security improvements. In this review, K. Hao et al, describe the explore integrity proofing using cryptographic security related to Blockchain model technology and its application. With supportive factors consider destroying many technical areas in the future, deals with security factors. However, it will be upgraded in areas that have been discouraged from many new security areas. Security concerns, not only from some unexpected areas but also from distributed/distributed computing issues and information encryption algorithm issues. The resultant of these conventional algorithms produce a different level of terms of analysis that are reviewed on the rest of the sections.

Attribute based Encrypted and Secured Cloud based Personal Health Record System


European Journal of Molecular & Clinical Medicine, 2021, Volume 8, Issue 2, Pages 1501-1507

As cloud computing has become an incredibly important task in real life, security of privacy in many areas, in especially in the context of Personal Health Record (PHR), has indeed been given growing attention. The traditional encryption based on ciphertext policy (CP-ABE) allows you to control the scrambled PHR information policy in a fine-grained manner, however the accessing policy is also sent with the cipher text. The entry policy, however, cannot activate the anonymity of users, as it includes an excessively large number of confidential information from valid users of software. It is now important to ensure the privacy of users through hiding access strategies. The overwhelming majority of previous plans however have to deal with two problems: (1) certain plans do not accept a wide universe of the attributes, hence their common sense in PHR is considerably reduced and (2) the decryption costs are very high because the entry scheme is set up in cypher text. Their utility is thus drastically limited. To resolve these problems, we create a CP-ABE plot with proficient decryption, where both the scale of available parameters and the cost of decryption are steady. In addition, by using the dual system encoding technique, we demonstrate that the proposed conspire achieves full safety in the standard model.


K. Priya; S. Ranjana; R. Manimegala

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 9, Pages 1486-1495
DOI: 10.31838/ejmcm.07.09.160

This paper discusses the concept as well as application of an adaptive networked ehealth program. In particular after an incident or an disaster, the program is targeted at avoiding manual data entry and improving the capacity to have beds in hospitals, especially at mass occasions where a huge amount of people gather in one location.The device design is focused on medical devices that utilize wireless network sensor (WSNs) to calculate patients' physical parameters.Such sensors move information from the patient's devices to the cloud setting through the wireless network. The e-health smart network provides medical personnel with real-time data processing, reduces manual data collection and allows the tracking of

Cloud Computing Security for Electronic Healthcare Records Using Block-chain Model

Dr. A. POOBALAN; Dr. N. Uma Maheswari; Dr. R. Venkatesh

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 2007-2014

This paper presents detailed information about blockchain technology about how blockchain technology is applied for cloud security. Blockchain is one of the novels and ever breaking technology used for high security, which has been used in high-level government applications. In this paper, to tighten the cloud security, the blockchain security model is implemented and integrated with the cloud application. Thus, the healthcare application-based cloud environment is considered as the base application and experiment blockchain algorithm. From the obtained and compared results, it has been found that the blockchain security is highly suitable for cloud security and performs well in securing data during persistence and transmission.

Multi-Attribute Performance Analysis Model For Collaborative Cloud Environment Using TCP

VelMurugeshKumar. N; R. Nedunchelian

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 5, Pages 73-90

The problem of collaborative computing in the cloud environment has been well studied. Several approaches available to handle the issue of collaborative computing and still suffer to achieve higher performance in different QoS parameters. The performance of various simulation models has been analyzed for different parameters in this paper. To improve performance an efficient multi-attribute performance analysis model has been presented. The method first presents a collaborative content sharing strategy (CCSS) which maintains a dual copy of any resource in the cloud which has been accessed by different users. The method enforces an attribute-based update restriction (ABUR) algorithm which uses different keys to restrict malicious updating from different users. The public auditing has been enforced with ABUR and CCSS algorithms. The multi-attribute performance analysis model estimates various QoS parameters like throughput, completion, and public auditing on various simulation models of the cloud environment. A testbed is generated to simulate the performance of different cloud computing tools in a collaborative environment. The performance of simulation models has been measured and compared with the results of other models in detail

Cloud Computing Technology-Security Issues In Banks-An Overview

Dr. B. Balanagalakshmi; Dr. Sujeevan Kumar Bullard

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 2, Pages 5299-5304

To enhance the capacity for data management and to offer various services, Cloud computing technology is a best source. This technology is providing various services to the customers on demand through internet. Several benefits are provided by this Cloud technology to banks such as reducing costs, improved capacity of data processing and superior excellence in banking services. Financial institutions would use the services of cloud technology with more flexibility and efficiency as and when they require. But several organizations are hesitating to introduce this technology due to security challenges. This paper is studying about the challenges of cloud technology in offering various enhanced services to banks as well as to customers with alternative solution to contain the issues. Moreover, it is discussed about various challenges in offering these financial services to banking institutions. Hence the data is gathered through secondary sources such as newspapers, magazines and various journals. The study is descriptive in nature.

Enhancement of Big Data Security in Cloud Environment

Anshi Singh; Anjani Rai

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 59-63

In this research, the advanced encryption mechanism is discussed to secure big data in cloud computing. The services of Cloud computing are used on broad level because these services are Platform independent. Cloud computing eliminates the need to set specific software on system of user. To improve the security of cloud, the concept of Advanced Encryption Standard (AES) with Intrusion Detection System (IDS) method is integrated here. It is capable to offer the protection according to demands. It also enlarges the overall time period of the network. It is made to decrease the power utilization by the node. For optimum the local node network is differentiated into little zones. In addition, the algorithm for encoding is mentioned which is used to make encryption with Advanced Encryption Standard (AES).

Efficient Security Measures to Avoid Data Vul-nerabilities in Cloud Using Encryption Tech-niques

Nomula Manoj Kumar Reddy; S Divya

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 3, Pages 1571-1581

Thetechnology of engineering science is growingfaster and its usage isto bootincreasing speedily. The data and its usage has become an important issue in existence. There by the storage of data may be a crucial issue in means of life. For this data storage, Cloud Computing is useful. Cloud computing is that the follow of using a network of remote servers hosted on internet to store, manage and methodology data on demand and pay as per use. It provides access to a pool of shared resources instead of native servers or personal computers. as a result, outfit do not acquire the things physically, it saves managing value and time for organizations. As a result of the sector of cloud computing is spreading the new techniques are developing. This increase in cloud computing setting to boot can increase security challenges for cloud developers. Most of the organizations are an excellent deal concerned regarding the possession of their data.This analysis paper presents a review on the cloud computing concepts yet as security issues inherent at intervals the context of cloud computing and cloud infrastructure. This paper in addition analyses the key analysis and challenges that presents in cloud computing and offers best practices to service suppliers yet as enterprises. The foremost goal is to review different types of attacks and encryption techniques to secure the cloudmodel.

Online Medical Store Finding And Availability Of Medicine

P.Udith Rao; Mr. K. Logu

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 3, Pages 2220-2226

Now a day in this world most of them are affected by various types of diseases. So the use of medicine is increasing day by days. Every disease has some medicine to treat it. Medicine are of various types they are in the form of liquid, tablet, capsules, drops, injection etc. but in some situation everyone don’t have sufficient time to go to the medical shop for buying their medicines. But medicines are so important for the treatment of their diseases. In chronic type of health issues are based on the medicines availability. Sometimes absences of the medicines change the life of affected person. To avoid such kind of situation this proposed work provides the detail of all the medicine in the pharmacy are stored in with the help of the concepts of cloud computing is the on demand availability of the computer systems resources, mainly data storage and computing power without direct active management by the user.

Cloud Computing Technology – A Digital Transformative Solution For Banking Industry- An Overview

Dr. Sukhavasi Santha kumari; Dr. N. Aruna

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 2, Pages 5305-5310

The banking industry hosts a large amount of customer data and is always anxious with providing the best services to its customers. In such a scenario, cloud computing technology is the contemporary transformative digital solution that offers unprecedented security, quickness and scalability to banking industry, while improving the ability to manage customer data. Several benefits are offered by Cloud technology such as cost effectiveness, enhanced data processing capacity and high-end financial services, digital accountability, transparency and timeless. Additively the application of cloud computing in banking industry provides the relative solution for the security issues. Large banks, building their own customized financial cloud as a precise tool, in contrary small banks relying on public financial cloud for a cloud service provider, can help their business to grow quickly and effectively by reducing information gap with limited man power. This paper is intended to provide an overview to this advanced technology and advantages of the cloud computing of banking industry above the traditional banking processes.

Manipulative Cyber Assurance Procedures: The Role of Pre-Communication and Safety Mutuality

Anshey Singh; Anantram .

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 94-97

Cyber protection is a reasonable technique for digital hazard transfers. In any case, it has been indicated that relying upon the highlights of the hidden condition, it could possibly improve the condition of system security. Present paper considers a solitary benefit expanding guarantor (head) with intentionally partaking protects/customers (specialists). We are especially keen on two unmistakable highlights of digital security and their effect on the agreement plan issue. The first is the related idea of digital security, whereby one substance's condition of security depends on its own venture and exertion, yet additionally the endeavors of others' in the equivalent eco-framework (for example externalities). The second is the way that ongoing advances in Internet estimation joined with AI strategies presently permit us to perform precise quantitative evaluations of security act at a firm level. This can be utilized as an apparatus to play out an underlying security review, or prescreening, of a planned customer to all the more likely empower premium segregation and the structure of altered approaches.

Performance Analysis and Storage Management for Multiple Cloud Service Providers


European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 385-394

SAAS (Storage as a service) is a prominent cloud computing service that helps the cloud users to overcome the bounded resources and the storage expansion by advancing the devices. Data is outsourced by the encryption format due to the security and safety reasons so that the encrypted data generates lot of storage waste in cloud by complicating the data exchange among the authorized users. But here there are many challenges such as storage and managing encrypted data by duplication where as traditional duplication schemes in cloud always focus on application scenarios that are completely controlled by data owners or servers in cloud. Here the flexibility of satisfaction of different requests by data owners on level sensitivity of data. Present paper offers both reduplication scheme managing and access control of same time through multiple cloud service providers (CSP’s) for the evaluation and performance of comparison and implementation additionally security analysis.