Home About Login Current Archives Announcements Editorial Board
Submit Now For Authors Call for Submissions Statistics Contact
Home > Archives > Volume 20, No 8 (2022) > Article

DOI: 10.14704/nq.2022.20.8.NQ44470


Dr.K.Ketzial Jebaseeli


Curtailing the overload usage of cloud by incorporating several methodologies which will also assist in the sustaining of the records safely is being deliberated skillfully. Especially in the field of medical management, convenient and proper coordination of data could be agreed upon by practicing the schemes that are codified here. The principal intention is to take down the time and expenditure appropriated heretofore. In an enormous league where the data is quite extensive as in health service institutions, preserving the delicate information amongst a group of working staffs is quite challenging. Highly fortified security system is the radical imperative of the today’s novel world. In this configuration, outsourcing of data in cloud is insured with tightened security by categorizing the files with data individually and aggregating the key, this could be done by following the procedure of ensemble signature. A lightweight data preserving model using ensemble signature scheme to the outsourced health files in cloud is employed here for the protection of files. This will mitigate the time taken to decrypt the data that is encrypted and conserved. The grouped files containing the user information separately has to be scrutinized in order to find the required material, the process of utilizing the search scheme acknowledged as k-vertex is integrated as the following methodology of Accessing dynamic health records using K-Vertex search scheme model towards hierarchical users in cloud servers. BMSA the blockade maneuver sequence amplification is assimilated to faultlessly contrive or schematize the warranted healthcare files are laboured for an effective application and usage in this research work.


Cloud ,Encryption Decryption, K-Vertex, BMSA, Security

Full Text