Personal Health Records in Cloud Computing Using Multi Authority Attribute-based Encryption

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 4, Issue 2, No 3, 2016

Copyright: All Rights Reserved ©2016

Year of Publication: 2016

Author: V.Ankayarkanni,Dr.V.Jayaraj

Reference:IJCS-129

View PDF Format

Abstract

A PHR service allows a patient to create, manage, and control her Personal health data storage, retrieval and sharing of the medical information in web. The patient could actually control the sharing of their sensitive Personal health information’s are stored on a third party server which people may not fully trusted. To ensure patient centric privacy control over their own PHR have fine-grained access control mechanisms that work in the semi trusted servers and the PHR owner encrypt her file should only be available decrypt it. Each attribute authority (AA) in it governs disjoint subset of user role attributes, while none of them alone is able to control the security of the whole system. We propose mechanisms for key distribution and encryption so that PHR owners can specify personalized fine-grained role based access policies during file encryption. In the personal domain, owners directly assign access privileges for personal users and encrypt PHR file under its data attributes MA-ABE by putting forward an efficient on demand user/attribute revocation scheme, and prove its security under standard security assumptions

References

[1] Ming Li “Authorized private keyword search over encrypted personal health records in cloud computing” [2] H. Lo¨ hr, A.-R. Sadeghi, and M. Winandy, “Securing the E-Health Cloud,” Proc. First ACM Int’l Health Informatics Symp. (IHI ’10), pp. 220-229, 2010. [3] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized Private KeywordSearch over Encrypted Personal Health Records in Cloud Computing,” Proc. 31st Int’l Conf. Distributed Computing Systems(ICDCS ’11), June 2011. [4]“The Health Insurance Portability and AccountabilityAct,”http://www.cms.hhs.gov/HIPAAGenInfo/01_Overview.asp,2012. [5] “Google, Microsoft Say Hipaa Stimulus Rule Doesn’t Apply toThem,” http://www.ihealthbeat.org/Articles/2009/4/8/, 2012. [6] “At Risk of Exposure – in the Push for Electronic Medical Records,Concern Is Growing About How Well Privacy Can Be Safeguarded,” http://articles.latimes.com/2006/jun/26/health/ he-privacy26, 2006. [7] K.D. Mandl, P. Szolovits, and I.S. Kohane, “Public Standards and Patients’ Control: How to Keep Electronic Medical Records Accessible but Private,” BMJ, vol. 322, no. 7281, pp. 283-287, Feb. 2001. [8] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” Proc. ACM Workshop Cloud Computing Security (CCSW ’09), pp. 103-114, 2009. [9] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable,and Fine-Grained Data Access Control in Cloud Computing,” Proc. IEEE INFOCOM ’10, 2010.


Keywords

Hybrid wireless Network, Three- Hop, Distributing, Throughput, Overhead.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog