Cloud computing based personal health records by using data encryption

  • Authors

    • Dr R. Bulli Babu
    • P Jagadeesh
    • S Sonia
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10721
  • PHR, Helter-Skelter, Proprietors
  • Abstract

    Unique wellbeing record (PHR)1 will be kept up in the bound together server should keep up the patients near home and PHR administra-tions would outsourced should outcast pro co-ops. Those essential concerns may be around examination information. Those tolerant records ought to make if those patients Might truly control those advertising kept up with helter-skelter2 security which is more security. The securi-ty plans are used to protect that particular information from general population get. Tolerant information could make accessed Eventually Tom's perusing A large number distinctive individuals. Each power will be doled out with right reasonably for a specific situated of qualities. The entry control and protection management is an intricate assignment in the tolerant wellbeing record oversaw economy methodology. Conveyed registering may be a casual statement used to depict a combination about Different sorts about registering thoughts that incorpo-rate endless that would chortle through a continuous correspondence a. It may be an identical word to passed on preparing over an arrange-ment and methods those abilities will run a system around a number chortled Pcs meanwhile majority of the data proprietors invigorate those singular data under outcast cloud server ranches. Those novel patient-driven framework Also a suited from claiming data get will instruments will control PHR1 set far over semi-put stock Previously, servers. On finish fine-grained What's more versant majority of the data get will control to PHRs, we utilize quality built encryption (ABE) methodologies on scramble each patient's PHR1 record. Different data proprietors3 camwood get should comparable data values. Those recommended arrangement Might a chance to be arrived at out to pro-gressive quality built encryption (HABE) for get to control part.

     

  • References

    1. [1] Ming Li, Shucheng Yu, and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute based Encryptionâ€, IEEE Transactions On Parallel And Distributed Systems 2012.

      [2] “At risk of exposure – in the push for electronic medical records, concern is growing about how well privacy can be safeguarded,†2006. [Online]. Available: http://articles.latimes.com/2006/jun/26/health/he-privacy26.

      [3] A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,†in ACM CCS, ser. CCS ’08, 2008, pp. 417–426.

      [4] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes,†2009.

      [5] S. Narayan, M. Gagn´e, and R. Safavi-Naini, “Privacy preserving phr system using attribute-based infrastructure,†ser. CCSW ’10, 2010, pp. 47–52.

      [6] Melissa Chase, “Multi-authority Attribute Based Encryptionâ€, TCC, volume 4392 of LNCS, pages 515–534, Springer, 2007.

      [7] X. Liang, R. Lu, X. Lin, and X. S. Shen, “Ciphertext policy attribute based encryption with efficient revocation,†Technical Report, University of Waterloo, 2010.

      [8] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,†in IEEE INFOCOM’10, 2010.

      [9] N. Attrapadung and H. Imai, “Conjunctive broadcast and attribute-based encryption,†Pairing-Based Cryptography– Pairing 2009, pp. 248–265, 2009.

      [10] S. Ruj, A. Nayak, and I. Stojmenovic, “Dacc: Distributed access control in clouds,†in 10th IEEE TrustCom, 2011.

      [11] “Privacy-preserving personal health record system using attribute-based encryption,†Master’s thesis, WORCESTER POLYTECHNIC INSTITUTE, 2011.

      [12] S. M¨ uller, S. Katzenbeisser, and C. Eckert, “Distributed attribute based encryption,â€Information Security and Cryptology–ICISC 2008, pp. 20–36, 2009.

      [13] Priyanka Korde, Vijay Panwar and SnehaKalse, “Securing Personal Health Records in Cloud using Attribute Based Encryption,â€International Journal of Engineering and Advanced Technology (IJEAT), Issue-4, April 2013.

      [14] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,†in ASIACCS’10, 2010.

      [15] C. Dong, G. Russello, and N. Dulay, “Shared and searchable encrypted data for untrusted servers,†in Journal of Computer Security, 2010.

      [16] www.ijesr.org

      [17] www.ijasrcsse.com

      [18] www.ijcttjournal.com

  • Downloads

  • How to Cite

    R. Bulli Babu, D., Jagadeesh, P., & Sonia, S. (2018). Cloud computing based personal health records by using data encryption. International Journal of Engineering & Technology, 7(2.7), 367-371. https://doi.org/10.14419/ijet.v7i2.7.10721

    Received date: 2018-03-27

    Accepted date: 2018-03-27

    Published date: 2018-03-18