Figure-3 - uploaded by Maria Anu
Content may be subject to copyright.
Verify OTP authentication code.  

Verify OTP authentication code.  

Source publication
Article
Full-text available
A Medical Information System (MIS) is an emerging patient-driven strategy for medical data platform, which is for the most part circulated to outsource at an outsider, such as cloud suppliers. Be that as it may, there have been a lot of security worries as individual medicinal data should be uncovered to outsider servers and to unapproved parties....

Context in source publication

Context 1
... our medical information system was highly secured from miss uses of unauthorized persons which is shown in Figure-2 enabling the two factor authentication your account becomes more securable so that you get a verification code that indicate the users can manage their own accounts and Figure-3 verifying the OTP code each time when you access the medical information system. The access control privileges for each file provided for the every user before encryption and then it is uploaded in the system which is shown in Figure-4. ...

Similar publications

Article
Full-text available
Digital images are now widely used in modern clinic diagnosis. The diagnostic images with confidential information related to patients’ privacy are stored and transmitted via public networks. Secured schemes to guarantee confidentiality of patients’ privacy are becoming more and more vital. This paper proposes an adaptive medical image encryption a...

Citations

Chapter
The extensive usage of Internet is the major cause of more cyber-attacks. And these attacks are mainly with IP spoofing. So, the IOT devices must be secured to stop the IP spoofing and that involves the authorization of the source address of IP packets which are received at the gateway. This is important to stop an user who is unsanctioned from utilizing the IP address as the flooding packets and source to the gateway. From then on, the assigned bandwidth to allow users is used. All unique file names and file attributes are registered daily by tenants on the virtual machine and from these file lists and IP events often import specific data into CSP. Then, the assessing task will be done by the TWCP for remaining everyday log details and mailing the security risk information to all the tenants. We designed and implemented the DTOS program (DNS TRAFFIC QUERY PROGRAM) to analyze the DNS traffic. The previous IP address and also the calculation of the next IP address were performed. The analyzing and the prediction of the IP address is done mainly in two important cloud computing providers and discovered that the real entropy given by the specified IP addresses is restricted. Here, we consider many predictive models, such as the Markov process model which produces prediction data of the addresses from the connected IP addresses.
Chapter
Data proprietors will store their data out in the open cloud alongside encryption and specific arrangement of credits to get to control on the cloud data. While transferring the data into open cloud, they will allot some ascribe set to their data. On the off chance that any approved cloud client needs to download their data, they ought to enter that specific credit set to perform further activities on data proprietor's data. A cloud client needs to enlist their subtleties under cloud association to get to the data proprietor's data. Clients need to present their subtleties as characteristics alongside their assignment. In light of the client subtleties, semi-trusted authority creates decoding keys to gain power on proprietor's data. A client can play out a great deal of activities over the cloud data. In the event that the client needs to peruse the cloud data, he should enter some read-related traits, and on the off chance that he needs to compose the data, he should enter compose-related qualities. Adversary every single activity client in an association would be checked with their one of a kind quality set. These qualities would be shared by the administrators to the approved clients in cloud association. These characteristics will be put away in the approach records in a cloud. On the off chance that any client releases their interesting decoding key to the any malignant client, data proprietors needs to follow by sending review solicitation to evaluator and reviewer will process the data proprietors demand and infers that who is the liable.
Chapter
Customer relationship management (CRM) is an established concept which is used to manage customer and employee’s lifecycle management through various techniques and process-oriented tools. The main reason of this CRM is to improve the relationship between customers and the company by using many modules like to examine of sales, client services, and many others. The objective behind this project is to increase the sales efficiency of the organization which returns more profit for the organization. In this paper, CRM includes few modules. Customer relationship management (CRM), it is troublesome not to see robotized chatbot changing these stages and empowering deals and advertising groups to all the more likely react to their clients. Some may scrutinize the humankind of CRM chatbot; however, there is no denying that opening up CRM information by utilizing creative devices helps speed the business cycle.
Chapter
Agriculture is one of the significant distinct and income creating segment in India. Various seasons and Organic Patterns impact the harvest creation, but since the change in these may bring about a phenomenal misfortune to ranchers. These elements can be limited by utilizing an appropriate methodology identified with the information on soil type, strength, reasonable climate, type of crop. Our aim of Soil Features should meet these fundamental prerequisites, i.e., it needs to discover whether a specific land is versatile for Agriculture, with the ideal conditions for farming, and to improve the precision of the calculations and contrast to locate the best among the three. This encourages us to arrange which land is for Farming and which one is Non Farming. This encourages us to develop crops and do horticulture. The framework is stacked with soil pieces of information like the region, locale it is available, surface of dirt, water system scaling, pivot, yield, soil disintegration, wind disintegration, slant, evacuation, and so forth. The chi-square element calculation is utilized for Feature Extraction, Selection, and Scaling. It diminishes the clamor highlights of the dataset and enhances the highlights for the framework to process. The precision will be created and expanded with the assistance of the calculations like DNN, Random Forest, and Linear Discriminant Analysis. The results show that the proposed conspire isn’t just doable yet additionally assists ranchers with understanding their ecological list of homesteads.