An Efficient Privacy Preserving Medical Image Retrieval Using ROI Enabled Searchable Encryption

نویسنده

  • J. Hyma
چکیده

In this paper, we propose a new idea of searchable medical image encryption method to provide secrecy or authentication when a database is stashed away on a host maintained by a third-party server. This project addresses the trouble of enabling content based image retrieval throughout encrypted medical image dataset. Medical image database is encrypted by the owner of the content before transmitting or before stacked away on to the server. These encrypted stored data along with patient information are made accessible for authorized users only. The authorized user can pose the query on the encrypted data base and able to retrieve the most relevant cluster of images from the database maintained by the third part server. We compare our proposed privacy preserving data mining technique with conventional technique in terms of precision and recall. The insights obtained through this research and comparisons will help to design real time algorithms appropriate for privacy aware third party server systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts

Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Based Encryption (HIBE) schemes is useful primitives that can be applicable to searchable encryptions [4], such as ID-based searchable encryption, temporary searchable encryption [1], and anonymous for...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud Computing

Cloud computing is a specialised form of distributed computing that introduces utilization models for remotely provisioning scalable and measured resources. The driving motivation behind the cloud computing is to provide IT resources as a service that encapsulates other IT resources. Data service outsourcing is one of the service that is economically enabled by the cloud computing. But in order...

متن کامل

An Authenticated Privacy Preserving Multiword Data Retrieval over Encrypted Cloud

Cloud Computing, the long term goal of utility computing has transformed the IT industry a lot. Data constantly contain sensitive information should be secured by policies and regulation defined by various organizations. However, information on cloud always causes privacy problems. Data encryption protects privacy and confidentiality but efficiency is not ensured. Symmetric Searchable Encryptio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016