SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION

被引:0
|
作者
Manjutha, M. [1 ]
Kumar, Arun K. [2 ]
Sri, Subha, V [2 ]
Dharshana, Shree D. [2 ]
机构
[1] Sri Krishna Arts & Sci Coll, Dept Informat Technol, Coimbatore, Tamil Nadu, India
[2] Sri Krishna Arts & Sci Coll, Dept Informat & Comp Technol, Coimbatore, Tamil Nadu, India
关键词
Personal health record [ PHR; Personal Health Information [PHI; Attribute-Based Encryption [ABE;
D O I
暂无
中图分类号
R914 [药物化学];
学科分类号
100701 ;
摘要
Personal Health Record (PHR) holds a great position as it centralizes the server to preserve a patient's personal health record in a centralized way which greatly facilitates the storage, access and sharing of personal health data. Still, there is a considerable privacy problem as personal health information is probably exposed to thirdparty servers and unauthorized parties. To guarantee the patients control over their PHRs, a method to encrypt the PHRs before storing them on cloud is practiced. But still issues like risks of privacy, efficiency in key administration, flexible access and efficient user administration, have remained the important challenges toward achieving better, cryptographically imposed data access control. In this research paper, we developed a mechanism for control of data access to PHRs stored in cloud servers using ABE encryption approach to encrypt each PHR file. In this proposed article we specialize in the multiple data owner scheme, and divide the users into security domains that highly reduce the key management complication for owners and users. In this system patient privacy is promised by exploiting multi-authority ABE. Our system also enables a key management paradigm, multiple data owner scenarios and increased complexity between data and end-users. Extensive analysis and experimental results are presented which shows the safety and efficiency of our proposed scheme.
引用
收藏
页码:81 / 92
页数:12
相关论文
共 50 条
  • [21] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 566 - 577
  • [22] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    INFOCOMMUNICATIONS JOURNAL, 2015, 7 (02): : 1 - 9
  • [23] Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing
    Li, Xiang
    Tian, Hui
    Ning, Jianting
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 347 - 354
  • [24] A secure billing protocol over attribute-based encryption in vehicular cloud computing
    Nkenyereye, Lewis
    Park, Youngho
    Rhee, Kyung Hyune
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [25] A secure billing protocol over attribute-based encryption in vehicular cloud computing
    Lewis Nkenyereye
    Youngho Park
    Kyung Hyune Rhee
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [26] Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
    Huang, Qinlong
    Yang, Yixian
    Shen, Mansuo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 239 - 249
  • [27] Comparative Study on Attribute-Based Encryption for Health Records in Cloud Storage
    Mhatre, Siddhesh
    Nimkar, Anant V.
    Dhage, Sudhir N.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 647 - 652
  • [28] EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing
    Huang Qinlong
    Ma Zhaofeng
    Yang Yixian
    Fu Jingyi
    Niu Xinxin
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (04) : 862 - 868
  • [29] EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing
    HUANG Qinlong
    MA Zhaofeng
    YANG Yixian
    FU Jingyi
    NIU Xinxin
    ChineseJournalofElectronics, 2015, 24 (04) : 862 - 868
  • [30] Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    Guo, Minyi
    COMPUTERS & SECURITY, 2011, 30 (05) : 320 - 331