http://www.iaeme.com/IJCET/index.asp 87 editor@iaeme.com
International Journal of Computer Engineering & Technology (IJCET)
Volume 8, Issue 5, Sep-Oct 2017, pp. 87–98, Article ID: IJCET_08_05_010
Available online at
http://www.iaeme.com/ijcet/issues.asp?JType=IJCET&VType=8&IType=5
Journal Impact Factor (2016): 9.3590(Calculated by GISI) www.jifactor.com
ISSN Print: 0976-6367 and ISSN Online: 0976–6375
© IAEME Publication
AN APPROACH TO SECURE MENTAL HEALTH
DATA IN THE CLOUD USING END-TO-END
ENCRYPTION TECHNIQUE
S. Meena
Research Scholar, Department of Computer Science,
Periyar University, Salem, India
Dr. V. Gayathri
Assistant Professor, Pee Gee College of Arts & Science,
Dharmapuri, India
ABSTRACT
Cloud computing is a great move from the conventional system of data storage
and transmission by the reason of its affordable cost, speed, global scale,
productivity, performance, and reliability. Cloud has several applications in the field
of education, social networking and medicine. But the advantage of cloud for medical
reasons is ideal, particularly because of the huge data generated by the healthcare
organizations. As in increasingly health organizations adopting towards electronic
health records in the cloud which can be accessed around the world for various
health issues regarding references, healthcare educational research and etc.
Nevertheless, the data security and privacy remain the challenging issues in the cloud
data transmission. It is inevitable to concede tight security to ensure the integrity of
the sensitive healthcare data which is stored and transferred through the cloud, from
the attacks of tampering, hacking and intrusion. Cryptography is the practice of
technique to secure communication from the third parties called opponent. In this
paper, we give an approach to protect mental health data by using End to end
encryption technique such as a strong encryption method which data could be in
readable form to sender and receiver only, also we propose a multi factor
authentication to make sure confidentiality of the data which logging is followed by a
user name and password then a user is to answer a question related to the subject
through the OTP (One-Time-Pad). Once authentication is verified successfully a user
can allow to access the data in the encrypted form. After that, a user can decrypt the
data followed by the key and can use it for their purposes. According to the
experimental result the system has greatly enhanced the data integrity and
confidentiality in the cloud.
Key word: Cloud, Data Security, Integrity, Confidentiality, End to End Encryption,
Multi-Factor Authentication, One-Time-Pad.