Cryptographic Solutions for Credibility and Liability Issues of Genomic Data - 2017


During this work, we tend to take into account a scenario that has a personal sharing his genomic information (or results obtained from his genomic information) with a service provider. During this state of affairs, (i) the service supplier wants to form sure that received genomic data (or results) in fact belongs to the corresponding individual (and computed properly), (ii) the individual desires to produce a digital consent along with his knowledge specifying whether or not the service supplier is allowed to any share his data, and (iii) if his information is shared without his consent, the individual wants to see the service provider that is accountable for this leakage. We tend to propose 2 schemes primarily based on homomorphic signature and mixture signature that links the knowledge concerning the legitimacy of the information to the consent and therefore the phenotype of the individual. Thus, to verify the data, each party additionally needs to use the proper consent and phenotype of the individual who owns the information.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic ApproachABSTRACT:With the ever-increasing demands on multimedia applications, cloud computing, thanks to its economical
PROJECT TITLE :Bruce Schneier: Building Cryptographic SystemsABSTRACT:Security professional Bruce Schneier discusses security from the perspectives of both the National Security Agency and therefore the National Institute of Standards
PROJECT TITLE :A Survey of Public-Key Cryptographic Primitives in Wireless Sensor NetworksABSTRACT:Cryptographic primitives are fundamental building blocks for planning security protocols to realize confidentiality, authentication,
PROJECT TITLE :Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directionsABSTRACT:Cloud-assisted wireless wearable communications are increasingly pervasive with the profound
PROJECT TITLE :Secure and Efficient Architectures for Single Exponentiations in Finite Fields Suitable for High-Performance Cryptographic ApplicationsABSTRACT:High performance implementation of single exponentiation in finite

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry