Loading

An Empirical Research for Secured Storage and Protecting Unauthorized access of Organ Donor Details
Geetha A1, S. Sobitha Ahila2, V.S. Vidhya Lakshmi3, S. Kalpana Devi4
1Ms. Geetha A, Assistant Professor, Department of Computer Science & Engineering, Easwari Engineering College, Chennai (Tamil Nadu), India.
2Dr. S. Sobitha Ahila, Associate Professor, Department of Computer Science & Engineering, Easwari Engineering College, Chennai (Tamil Nadu), India.
3Ms. V.S. Vidhya Lakshmi, Assistant Professor, Department of Computer Science & Engineering, Easwari Engineering College, Chennai (Tamil Nadu), India.
4Ms. S. Kalpana Devi, Assistant Professor, Department of Computer Science & Engineering, Easwari Engineering College, Chennai (Tamil Nadu), India.
Manuscript received on 30 September 2019 | Revised Manuscript received on 12 November 2019 | Manuscript Published on 22 November 2019 | PP: 1443-1449 | Volume-8 Issue-6S3 September 2019 | Retrieval Number: F12570986S319/19©BEIESP | DOI: 10.35940/ijeat.F1257.0986S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is the on-demand availability of computer system resources, particularly data storage and computing power, without direct active management by the user. Here an online organ donation system is developed with the help of the aforementioned technologies. The main aim of the paper is to make sure that the organs of the people, who have come forward to donate, reach the respective individual in need of the particular organ. Since everything is stored in the cloud, anybody can access it anytime, which in turn puts the data at risk. The secured sharing of donor detail is necessary. Encryption is done at two levels to provide security, one while the data is entered and the other done by a third party providing proxy re-encryption. Now, whenever a brain-dead patient is in the hospital, after thorough verification for any complications, the deciding parameters such as the organs that can be transplanted, blood group, presence of HIV positive and location, is compared with the cloud database using query filtering, which results in the nearest organ donor available meeting the requirements. The performance enhancement of cloud data using encryption schemes is of high potential.
Keywords: Cloud Computing; Proxy Re-Encryption; Query Filter.
Scope of the Article: Storage-Area Networks