http://www.iaeme.com/IJCET/index.asp 87 editor@iaeme.com International Journal of Computer Engineering & Technology (IJCET) Volume 8, Issue 5, Sep-Oct 2017, pp. 8798, Article ID: IJCET_08_05_010 Available online at http://www.iaeme.com/ijcet/issues.asp?JType=IJCET&VType=8&IType=5 Journal Impact Factor (2016): 9.3590(Calculated by GISI) www.jifactor.com ISSN Print: 0976-6367 and ISSN Online: 09766375 © IAEME Publication AN APPROACH TO SECURE MENTAL HEALTH DATA IN THE CLOUD USING END-TO-END ENCRYPTION TECHNIQUE S. Meena Research Scholar, Department of Computer Science, Periyar University, Salem, India Dr. V. Gayathri Assistant Professor, Pee Gee College of Arts & Science, Dharmapuri, India ABSTRACT Cloud computing is a great move from the conventional system of data storage and transmission by the reason of its affordable cost, speed, global scale, productivity, performance, and reliability. Cloud has several applications in the field of education, social networking and medicine. But the advantage of cloud for medical reasons is ideal, particularly because of the huge data generated by the healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Nevertheless, the data security and privacy remain the challenging issues in the cloud data transmission. It is inevitable to concede tight security to ensure the integrity of the sensitive healthcare data which is stored and transferred through the cloud, from the attacks of tampering, hacking and intrusion. Cryptography is the practice of technique to secure communication from the third parties called opponent. In this paper, we give an approach to protect mental health data by using End to end encryption technique such as a strong encryption method which data could be in readable form to sender and receiver only, also we propose a multi factor authentication to make sure confidentiality of the data which logging is followed by a user name and password then a user is to answer a question related to the subject through the OTP (One-Time-Pad). Once authentication is verified successfully a user can allow to access the data in the encrypted form. After that, a user can decrypt the data followed by the key and can use it for their purposes. According to the experimental result the system has greatly enhanced the data integrity and confidentiality in the cloud. Key word: Cloud, Data Security, Integrity, Confidentiality, End to End Encryption, Multi-Factor Authentication, One-Time-Pad.