{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:59:58Z","timestamp":1764997198679,"version":"3.40.5"},"reference-count":33,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>Recently, the electronic heath record (EHR) has become the chosen method to maintain a patient's health information. The advancement of cloud computing enables users to access their data with flexibility, providing large storage capability at low costs, which encourages EHR maintainers to consider shifting from their own storage to the cloud. In cloud computing, it is no doubt that securing EHRs poses a gigantic challenge. Various security properties like access control, data privacy, and scalable access between different clouds needs to be satisfied. This article presents a secure and efficient blueprint for securing data confidentiality on cloud computing storage. The proposed framework is carried out for EHR confidential data on cloud storage. Moreover, the proposed approach combines the obfuscation and RSA encryption together to enforce confidentiality and authentication. Through this framework, the data confidentiality and authentication scheme on EHR information can be enforced on clouds storage.<\/jats:p>","DOI":"10.4018\/ijisp.2019010105","type":"journal-article","created":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T10:52:15Z","timestamp":1542970335000},"page":"59-69","source":"Crossref","is-referenced-by-count":35,"title":["Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing"],"prefix":"10.4018","volume":"13","author":[{"given":"Pratiksha","family":"Gautam","sequence":"first","affiliation":[{"name":"Jaypee University of Information Technology, Waknaghat, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2637-2975","authenticated-orcid":true,"given":"Mohd. Dilshad","family":"Ansari","sequence":"additional","affiliation":[{"name":"CMR College of Engineering & Technology, Hyderabad, India"}]},{"given":"Surender Kumar","family":"Sharma","sequence":"additional","affiliation":[{"name":"Department of Physics, School of Basic and Applied Science, Galgotias University, Greater Noida, India"}]}],"member":"2432","reference":[{"key":"IJISP.2019010105-0","doi-asserted-by":"crossref","unstructured":"Ambedkar, B. R., Gupta, A., Gautam, P., & Bedi, S. S. (2011, June). An efficient method to factorize the rsa public key encryption. In 2011 International Conference onCommunication Systems and Network Technologies (CSNT) (pp. 108-111). IEEE.","DOI":"10.1109\/CSNT.2011.29"},{"key":"IJISP.2019010105-1","doi-asserted-by":"publisher","DOI":"10.1145\/1314257.1314263"},{"key":"IJISP.2019010105-2","first-page":"35","article-title":"Data storage security in cloud using metadata.","author":"R.Anitha","year":"2013","journal-title":"International Conference on Machine learning and Computer Science"},{"issue":"1","key":"IJISP.2019010105-3","first-page":"245","article-title":"AROcrypt: A confidentiality technique for securing enterprise\u2019s data in cloud.","volume":"7","author":"L.Arockiam","year":"2015","journal-title":"Int J Eng Tech"},{"issue":"9","key":"IJISP.2019010105-4","first-page":"6740","article-title":"AROMO security framework to enhance security of data in public cloud.","volume":"10","author":"L.Arockiam","year":"2015","journal-title":"International Journal of Applied Engineering Research"},{"issue":"2","key":"IJISP.2019010105-5","first-page":"397","article-title":"Introducing effective third party auditing (tpa) for data storage security in cloud. International","volume":"2","author":"S.Balakrishnan","year":"2011","journal-title":"Journal of Computer Science and Technology"},{"key":"IJISP.2019010105-6","doi-asserted-by":"crossref","unstructured":"Bhadauria, R., & Sanyal, S. (2012). Survey on security issues in cloud computing and associated mitigation techniques. arXiv:1204.0764","DOI":"10.5120\/7292-0578"},{"key":"IJISP.2019010105-7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"IJISP.2019010105-8","doi-asserted-by":"crossref","unstructured":"CongWang. K., & Qianwang, W. (2009). Ensuring data storage security in the cloud computing. In The17thIEEEinternational Workshop on Quality of Service. Chicago, USA: IEEE.","DOI":"10.1109\/IWQoS.2009.5201385"},{"key":"IJISP.2019010105-9","unstructured":"Cryptomathic tool (1986) Retrieved from http:\/\/extranet.cryptomathic.com\/rsacalc\/index"},{"key":"IJISP.2019010105-10","unstructured":"Dai Yuefa, W. B., Yaqiang, G., Quan, Z., & Chaojing, T. (2009, November). Data security model for cloud computing. In Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009) Qingdao, China (pp. 141-144)."},{"key":"IJISP.2019010105-11","unstructured":"Dan\u2019s tools. (1990). Retrieved from http:\/\/www.danstools.com\/javascript-obfuscate\/index.php"},{"key":"IJISP.2019010105-12","unstructured":"Duggins, S., Tsui, F., Karam, O., & Kubanyi, Z. (2013, January). Semantic Obfuscation and Software Intention. In Proceedings of the International Conference on Software Engineering Research and Practice (SERP) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)."},{"issue":"3","key":"IJISP.2019010105-13","first-page":"169","article-title":"Analysis of Data Confidentiality Techniques in Cloud Computing.","volume":"3","author":"M.Gawande","year":"2014","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"IJISP.2019010105-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.06.018"},{"key":"IJISP.2019010105-15","doi-asserted-by":"crossref","unstructured":"Hataba, M., & El-Mahdy, A. (2012, November). Cloud protection by obfuscation: Techniques and metrics. In 2012 Seventh International Conference onP2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) (pp. 369-372). IEEE Computer Society.","DOI":"10.1109\/3PGCIC.2012.18"},{"issue":"18","key":"IJISP.2019010105-16","article-title":"Implementing encryption algorithms to enhance data security of cloud in cloud computing.","volume":"70","author":"M.Kaur","year":"2013","journal-title":"International Journal of Computers and Applications"},{"key":"IJISP.2019010105-17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2271848"},{"issue":"5","key":"IJISP.2019010105-18","first-page":"15","article-title":"Is cloud computing really ready for prime time.","volume":"27","author":"N.Leavitt","year":"2009","journal-title":"Growth"},{"key":"IJISP.2019010105-19","doi-asserted-by":"crossref","unstructured":"Maheshwari, V., Nourian, A., & Maheswaran, M. (2012, December). Character-based search with data confidentiality in the clouds. In 2012 IEEE 4th International Conference onCloud Computing Technology and Science (CloudCom) (pp. 895-899). IEEE.","DOI":"10.1109\/CloudCom.2012.6427591"},{"key":"IJISP.2019010105-20","doi-asserted-by":"crossref","unstructured":"Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.","DOI":"10.6028\/NIST.SP.800-145"},{"key":"IJISP.2019010105-21","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-010-0425-z"},{"key":"IJISP.2019010105-22","unstructured":"Mukundrao, J. A., & Vikram, G. P. (2011). Enhancing security in cloud computing. Information and Knowledge Management."},{"key":"IJISP.2019010105-23","doi-asserted-by":"crossref","unstructured":"Oli, S. A., & Arockiam, L. (2017, February). Confidentiality Technique to Encrypt and Obfuscate Non-Numerical and Numerical Data to Enhance Security in Public Cloud Storage. In 2017 World Congress onComputing and Communication Technologies (WCCCT), (pp. 176-180). IEEE.","DOI":"10.1109\/WCCCT.2016.51"},{"key":"IJISP.2019010105-24","first-page":"11","article-title":"Data security over cloud.","author":"D. H.Patil","year":"2012","journal-title":"International Journal of Computers and Applications"},{"key":"IJISP.2019010105-25","doi-asserted-by":"crossref","unstructured":"Pearson, S., Shen, Y., & Mowbray, M. (2009, December). A privacy manager for cloud computing. In IEEE International Conference on Cloud Computing (pp. 90-106). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-10665-1_9"},{"key":"IJISP.2019010105-26","doi-asserted-by":"crossref","unstructured":"Prasadreddy, P. V. G. D., Rao, T. S., & Venkat, S. P. (2011, July). A threat free architecture for privacy assurance in cloud computing. In 2011 IEEE World Congress onServices (SERVICES) (pp. 564-568). IEEE.","DOI":"10.1109\/SERVICES.2011.11"},{"key":"IJISP.2019010105-27","doi-asserted-by":"crossref","unstructured":"Rukavitsyn, A. N., Borisenko, K. A., Holod, I. I., & Shorov, A. V. (2017, May). The method of ensuring confidentiality and integrity data in cloud computing. In 2017 XX IEEE International Conference onSoft Computing and Measurements (SCM) (pp. 272-274). IEEE.","DOI":"10.1109\/SCM.2017.7970558"},{"key":"IJISP.2019010105-28","unstructured":"ur Rehman, A., & Hussain, M. (2011). Efficient cloud data confidentiality for daas. International Journal of Advanced Science and Technology, 35, 1-10."},{"key":"IJISP.2019010105-29","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.47"},{"year":"1989","key":"IJISP.2019010105-30"},{"issue":"3","key":"IJISP.2019010105-31","first-page":"351","article-title":"Confidentiality protection in cloud computing systems.","volume":"4","author":"S. S.Yau","year":"2010","journal-title":"Int. J. Software and Informatics"},{"key":"IJISP.2019010105-32","doi-asserted-by":"crossref","unstructured":"Yoshitaka, A., Chujyou, S., & Kato, H. (2013, December). Analysis and Design of Personal Health Record Management System. In 2013 International Conference onSignal-Image Technology & Internet-Based Systems (SITIS) (pp. 800-805). IEEE.","DOI":"10.1109\/SITIS.2013.130"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=218846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T11:56:13Z","timestamp":1651838173000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2019010105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":33,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2019010105","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"type":"print","value":"1930-1650"},{"type":"electronic","value":"1930-1669"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}