SlideShare a Scribd company logo
 SECURE SENSITIVE DATA SHARING ON A BIG
DATA PLATFORM
Users store vast amounts of sensitive data on a big data platform.
Sharing sensitive data will help enterprises reduce the cost of providing users with
personalized services and provide value-added data services.
However, secure data sharing is problematic.
 This paper proposes a framework for secure sensitive data sharing on a big data platform,
including secure data delivery, storage, usage, and destruction on a semi-trusted big data
sharing platform.
We present a proxy re-encryption algorithm based on heterogeneous cipher text
transformation and a user process protection method based on a virtual machine monitor,
which provides support for the realization of system functions.
The framework protects the security of users’ sensitive data effectively and shares these
data safely.
At the same time, data owners retain complete control of their own data in a sound
environment for modern Internet Information security
 Users store vast amounts of sensitive data on a big data
platform.
 Sharing sensitive data will help enterprises reduce the cost of
providing users with personalized services and provide value-
added data services.
 However, secure data sharing is problematic.
 This paper proposes a framework for secure sensitive data sharing on a big data
platform, including secure data delivery, storage, usage, and destruction on a
semi-trusted big data sharing platform.
 We present a proxy re-encryption algorithm based on heterogeneous cipher text
transformation and a user process protection method based on a virtual machine
monitor, which provides support for the realization of system functions.
 The framework protects the security of users’ sensitive data effectively and shares
these data safely.
 Data encryption and access control of cloud storage
 Regarding encryption technology, the Attribute-Based Encryption (ABE) algorithm
includes Key-Policy ABE (KP-ABE) and Cipher text-Policy ABE (CPABE).
 ABE decryption rules are contained in the encryption algorithm, avoiding the costs of
frequent key distribution in cipher text access control.
 However, when the access control strategy changes dynamically, a data owner is
required to re-encrypt the data.
 A method based on PRE is proposed.
 A semi-trusted agent with a proxy key can re-encrypt cipher text; however, the agent
cannot obtain the corresponding plaintext or compute the decryption key of either party
in the authorization process.
 Trusted computing and process protection
 Trusted Computing Group (TCG) introduced the Trusted Platform
Module (TPM) in its existing architecture, to ensure that a general
trusted computing platform using TPM security features is credible.
 In academia, the main research idea includes first building a trusted
terminal platform based on a security chip, and then establishing trust
between Platforms through remote attestation.
 Then, trust is extended to the network. Integrity measurement is the
primary technical means of building a trusted terminal platform.
 Data destruction
 Proposed a security destruction scheme for electronic data. A new scheme, Self
Vanish, is proposed.
 This scheme prevents hopping attacks by extending the lengths of key shares and
significantly increasing the cost of mounting an attack.
 To solve the problem of how to prevent sensitive information from leaking, when
an emergency occurs, proposed a real-time sensitive safe data destruction
system.
 The open source cloud computing storage system, Hadoop Distributed File System
(HDFS), cannot destroy data completely, which may lead to data leak.
In summary, we proposed a systematic framework of secure sharing of sensitive data on big data
platform, which ensures secure submission and storage of sensitive data based on the
heterogeneous proxy re-encryption algorithm, and guarantees secure use of clear text in the cloud
platform by the private space of user process based on the VMM.
The proposed framework well protects the security of users’ sensitive data.
At the same time the data owners have the complete control of their own data, which is a feasible
solution to balance the benefits of involved parties under the semi-trusted conditions.
In the future, we will optimize the heterogeneous proxy re-encryption algorithm, and further
improve the efficiency of encryption. In addition, reducing the overhead of the interaction among
involved parties is also an important future work.
[1] S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based data sharing with attribute revocation, in Proc. 5th ACM
Symposium on Information, Computer and Communications Security, Beijing, China, 2010, pp. 261– 270.
[2] J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, in Proc. IEEE Symposium on
Security and Privacy, Oakland, USA, 2007, pp. 321–334.
[3] J. Li, G. Zhao, X. Chen, D. Xie, C. Rong, W. Li, L. Tang, and Y. Tang, Fine-grained data access control systems with
user accountability in cloud computing, in Proc. 2nd Int. Conf. on Cloud Computing, Indianapolis, USA, 2010, pp. 89–
96.
[4] L. Wang, L. Wang, M. Mambo, and E. Okamoto, New identity-based proxy re-encryption schemes to prevent
collusion attacks, in Proc. 4th Int. Conf. Pairing-Based Cryptograghy-Pairing, Ishikawa, Japan, 2010, pp. 327– 346.
[5] C. Gentry, A fully homorphic encryption scheme, Ph.D dissertation, Stanford University, California, USA, 2009.
 TO GET THIS PROJECT THROUGH OFFLINE
OR ONLINE PLEASE CONTACT BELOW
NUMBER :9791938249

More Related Content

PPTX
Secure sensitive data sharing on a big data platform
PDF
Secure sensitive data sharing on a big data platform
PDF
Dynamic and public auditing with fair arbitration for cloud data
PDF
Iaetsd enhancement of performance and security in bigdata processing
PPTX
Final_attribute based encryption in cloud with significant reduction of compu...
PDF
Cloud Data Security and Secure Data Sharing Methods
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
Acquisition of Secured Data from Cloud
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
Dynamic and public auditing with fair arbitration for cloud data
Iaetsd enhancement of performance and security in bigdata processing
Final_attribute based encryption in cloud with significant reduction of compu...
Cloud Data Security and Secure Data Sharing Methods
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Acquisition of Secured Data from Cloud

What's hot (20)

PDF
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
Efficient technique for privacy preserving publishing of set valued data on c...
PDF
Cloud Data Security and Secure Data Sharing Methods
PDF
IJARCCE 20
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PDF
J018145862
DOCX
A privacy leakage upper bound constraint based approach for cost-effective pr...
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PPTX
Final 1st
DOCX
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
PDF
C017421624
PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
PDF
Homomorphic encryption algorithms and schemes for secure computations in the ...
PPTX
Authentication on Cloud using Attribute Based Encryption
PDF
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
Privacy preserving multi-keyword ranked search over encrypted cloud data
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Efficient technique for privacy preserving publishing of set valued data on c...
Cloud Data Security and Secure Data Sharing Methods
IJARCCE 20
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
J018145862
A privacy leakage upper bound constraint based approach for cost-effective pr...
Mona secure multi owner data sharing for dynamic groups in the cloud
Final 1st
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
C017421624
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Homomorphic encryption algorithms and schemes for secure computations in the ...
Authentication on Cloud using Attribute Based Encryption
Ad

Viewers also liked (20)

PPTX
Why Data Security is Important
PPTX
Big data ppt
PPT
Qualitative data analysis research school
PPTX
Advanced threat protection and big data
PDF
3 guiding priciples to improve data security
PPT
David Smith gfke 2014
PPTX
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
PDF
Big Data and Mobile Commerce - Privacy and Data Protection
PDF
Privacy and Big Data Overload!
PDF
Best Practices for Protecting Sensitive Data Across the Big Data Platform
PPTX
Cloud computing for mobile users can offloading computation save energy
PPTX
Presentation on vechile operator safety
PPT
Why Be Ethical ?
PPTX
Data protection and privacy framework in the design of learning analytics sys...
PDF
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
PPT
PPTX
Brain Finger Printing Technology
PPTX
Power generation from speed breakers
PPTX
Brain Fingerprinting PPT
PDF
Big Data: Issues and Challenges
Why Data Security is Important
Big data ppt
Qualitative data analysis research school
Advanced threat protection and big data
3 guiding priciples to improve data security
David Smith gfke 2014
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Big Data and Mobile Commerce - Privacy and Data Protection
Privacy and Big Data Overload!
Best Practices for Protecting Sensitive Data Across the Big Data Platform
Cloud computing for mobile users can offloading computation save energy
Presentation on vechile operator safety
Why Be Ethical ?
Data protection and privacy framework in the design of learning analytics sys...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Brain Finger Printing Technology
Power generation from speed breakers
Brain Fingerprinting PPT
Big Data: Issues and Challenges
Ad

Similar to Secure sensitive data sharing on a big data platform (20)

PDF
Attribute-Based Data Sharing
PDF
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
PDF
Cloud Computing Environment using Secured Access Control Technique
PDF
A novel cloud storage system with support of sensitive data application
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
Paper id 27201448
PDF
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
PDF
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
DOCX
Providing user security guarantees in public infrastructure clouds
PDF
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
PDF
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
PDF
Centralized Data Verification Scheme for Encrypted Cloud Data Services
PDF
Survey On: Auditing Public Clouds
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Attribute-Based Data Sharing
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
Cloud Computing Environment using Secured Access Control Technique
A novel cloud storage system with support of sensitive data application
Preserving Privacy Policy- Preserving public auditing for data in the cloud
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Secure Data Sharing In an Untrusted Cloud
Paper id 27201448
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Providing user security guarantees in public infrastructure clouds
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Survey On: Auditing Public Clouds
International Journal of Computational Engineering Research(IJCER)
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud

More from Nexgen Technology (20)

DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
DOCX
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
DOCX
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
DOCX
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
DOCX
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
DOCX
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
DOCX
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
DOCX
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
DOCX
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
DOCX
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Pre independence Education in Inndia.pdf
PPTX
Lesson notes of climatology university.
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Classroom Observation Tools for Teachers
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
Microbial disease of the cardiovascular and lymphatic systems
Insiders guide to clinical Medicine.pdf
Microbial diseases, their pathogenesis and prophylaxis
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
O7-L3 Supply Chain Operations - ICLT Program
human mycosis Human fungal infections are called human mycosis..pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPH.pptx obstetrics and gynecology in nursing
Pre independence Education in Inndia.pdf
Lesson notes of climatology university.
Module 4: Burden of Disease Tutorial Slides S2 2025
Final Presentation General Medicine 03-08-2024.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
TR - Agricultural Crops Production NC III.pdf
Classroom Observation Tools for Teachers
STATICS OF THE RIGID BODIES Hibbelers.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Anesthesia in Laparoscopic Surgery in India

Secure sensitive data sharing on a big data platform

  • 1.  SECURE SENSITIVE DATA SHARING ON A BIG DATA PLATFORM
  • 2. Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic.  This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform. We present a proxy re-encryption algorithm based on heterogeneous cipher text transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions. The framework protects the security of users’ sensitive data effectively and shares these data safely. At the same time, data owners retain complete control of their own data in a sound environment for modern Internet Information security
  • 3.  Users store vast amounts of sensitive data on a big data platform.  Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value- added data services.  However, secure data sharing is problematic.
  • 4.  This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform.  We present a proxy re-encryption algorithm based on heterogeneous cipher text transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions.  The framework protects the security of users’ sensitive data effectively and shares these data safely.
  • 5.  Data encryption and access control of cloud storage  Regarding encryption technology, the Attribute-Based Encryption (ABE) algorithm includes Key-Policy ABE (KP-ABE) and Cipher text-Policy ABE (CPABE).  ABE decryption rules are contained in the encryption algorithm, avoiding the costs of frequent key distribution in cipher text access control.  However, when the access control strategy changes dynamically, a data owner is required to re-encrypt the data.  A method based on PRE is proposed.  A semi-trusted agent with a proxy key can re-encrypt cipher text; however, the agent cannot obtain the corresponding plaintext or compute the decryption key of either party in the authorization process.
  • 6.  Trusted computing and process protection  Trusted Computing Group (TCG) introduced the Trusted Platform Module (TPM) in its existing architecture, to ensure that a general trusted computing platform using TPM security features is credible.  In academia, the main research idea includes first building a trusted terminal platform based on a security chip, and then establishing trust between Platforms through remote attestation.  Then, trust is extended to the network. Integrity measurement is the primary technical means of building a trusted terminal platform.
  • 7.  Data destruction  Proposed a security destruction scheme for electronic data. A new scheme, Self Vanish, is proposed.  This scheme prevents hopping attacks by extending the lengths of key shares and significantly increasing the cost of mounting an attack.  To solve the problem of how to prevent sensitive information from leaking, when an emergency occurs, proposed a real-time sensitive safe data destruction system.  The open source cloud computing storage system, Hadoop Distributed File System (HDFS), cannot destroy data completely, which may lead to data leak.
  • 8. In summary, we proposed a systematic framework of secure sharing of sensitive data on big data platform, which ensures secure submission and storage of sensitive data based on the heterogeneous proxy re-encryption algorithm, and guarantees secure use of clear text in the cloud platform by the private space of user process based on the VMM. The proposed framework well protects the security of users’ sensitive data. At the same time the data owners have the complete control of their own data, which is a feasible solution to balance the benefits of involved parties under the semi-trusted conditions. In the future, we will optimize the heterogeneous proxy re-encryption algorithm, and further improve the efficiency of encryption. In addition, reducing the overhead of the interaction among involved parties is also an important future work.
  • 9. [1] S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based data sharing with attribute revocation, in Proc. 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, 2010, pp. 261– 270. [2] J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, in Proc. IEEE Symposium on Security and Privacy, Oakland, USA, 2007, pp. 321–334. [3] J. Li, G. Zhao, X. Chen, D. Xie, C. Rong, W. Li, L. Tang, and Y. Tang, Fine-grained data access control systems with user accountability in cloud computing, in Proc. 2nd Int. Conf. on Cloud Computing, Indianapolis, USA, 2010, pp. 89– 96. [4] L. Wang, L. Wang, M. Mambo, and E. Okamoto, New identity-based proxy re-encryption schemes to prevent collusion attacks, in Proc. 4th Int. Conf. Pairing-Based Cryptograghy-Pairing, Ishikawa, Japan, 2010, pp. 327– 346. [5] C. Gentry, A fully homorphic encryption scheme, Ph.D dissertation, Stanford University, California, USA, 2009.
  • 10.  TO GET THIS PROJECT THROUGH OFFLINE OR ONLINE PLEASE CONTACT BELOW NUMBER :9791938249