RETRACTED: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption (Retracted Article)

被引:30
作者
Vijayakumar, V. [1 ]
Priyan, M. K. [2 ]
Ushadevi, G. [2 ]
Varatharajan, R. [3 ]
Manogaran, Gunasekaran [4 ]
Tarare, Prathamesh Vijay [2 ]
机构
[1] VIT Univ, Sch Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] VIT Univ, Sch Informat Technol & Engn, Vellore, Tamil Nadu, India
[3] Sri Ramanujar Engn Coll, Chennai, Tamil Nadu, India
[4] Univ Calif Davis, Davis, CA 95616 USA
关键词
AES encryption; Cloud computing; Proxy re-encryption; Big data encryption; Cloud security; Electronic health records; PUBLIC-KEY ENCRYPTION; SYSTEM; AUTHENTICATION; INTERNET; SEARCH; SCHEME;
D O I
10.1007/s11036-018-1060-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the present era of Information Technology, almost all big and small scale companies are moving towards cloud to store and manage the data. Cloud computing is a routine of deploying a structure of distant servers speed up on the Internet to store, oversee, and manage information, rather than a neighbourhood server or a PC. The purpose for cloud procurement is reduced cost, adaptability, regular access and refreshed programming. Nowadays, healthcare frameworks are adjusting computerized stages and ending up being more patient-centered and data driven. In this paper, we present a planning empowered intermediary re-encryption method to defeat the security issues. This Technique will allow only limited access rights to an authorized agent to access the records for a specific time period. This technique will use a searchable encryption and proxy Re-encryption technique.
引用
收藏
页码:1034 / 1045
页数:12
相关论文
共 55 条
  • [21] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [22] HIoTPOT: Surveillance on IoT Devices against Recent Threats
    Gandhi, Usha Devi
    Kumar, Priyan Malarvizhi
    Varatharajan, R.
    Manogaran, Gunasekaran
    Sundarasekar, Revathi
    Kadu, Shreyas
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (02) : 1179 - 1194
  • [23] Iovino V, 2008, LECT NOTES COMPUT SC, V5209, P75, DOI 10.1007/978-3-540-85538-5_5
  • [24] RETRACTED: Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things (Retracted Article)
    Kumar, Priyan Malarvizhi
    Gandhi, Ushadevi
    Varatharajan, R.
    Manogaran, Gunasekaran
    Jidhesh, R.
    Vadivel, Thanjai
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S7733 - S7744
  • [25] Li JH, 2015, IEEE ASME INT C ADV, P1, DOI 10.1109/AIM.2015.7222499
  • [26] Authorized Private Keyword Search over Encrypted Data in Cloud Computing
    Li, Ming
    Yu, Shucheng
    Cao, Ning
    Lou, Wenjing
    [J]. 31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 383 - 392
  • [27] A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
    Li, Xiong
    Niu, Jianwei
    Bhuiyan, Md Zakirul Alam
    Wu, Fan
    Karuppiah, Marimuthu
    Kumari, Saru
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3599 - 3609
  • [28] A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Wu, Fan
    Sangaiah, Arun Kumar
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 103 : 194 - 204
  • [29] Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
    Li, Xiong
    Ibrahim, Maged Hamada
    Kumari, Saru
    Sangaiah, Arun Kumar
    Gupta, Vidushi
    Choo, Kim-Kwang Raymond
    [J]. COMPUTER NETWORKS, 2017, 129 : 429 - 443
  • [30] Lin L, 2013, PROCEEDINGS OF 2013 IEEE INTERNATIONAL CONFERENCE ON MEDICAL IMAGING PHYSICS AND ENGINEERING (ICMIPE), P132, DOI 10.1109/ICMIPE.2013.6864519