PHR in Cloud Environment Using Enhanced Attribute Based Encryption and Advanced Encryption Standard

Article Preview

Abstract:

Personal Health Record is internet based application that enables individuals to access and coordinates their womb-to-tomb health data. The patients have management over access to their own PHR. To attain security of non-public health records, we have a tendency to use the attribute based secret writing to write in code to inform before outsourcing it. Here we have a tendency to specialize in multiple forms of PHR owner situation and division of non-public health records users into multiple security domains that cut back key management complex for house owners and users. A high degree of patient’s privacy is secured. Our theme offer a personal health record owner full management of his/her information. In depth security and performance analysis shows that the projected theme is very economical.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

588-592

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] L. Mingi, Y. Shucheng, Y. Zheng, K. Ren, and W. Lou, Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 1, pp.131-143, (2013).

DOI: 10.1109/tpds.2012.97

Google Scholar

[2] M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, Secure Attribute-Based Systems, Journal of Computer Security, Vol. 18, No. 5, p.799–837, (2010).

DOI: 10.3233/jcs-2009-0383

Google Scholar

[3] Yu, C. Wang, K. Ren, and W. Lou, Achiving secure, scalable and fine-grained data access control in cloud computing, IEEE INFOCOM, pp.534-542, (2010).

DOI: 10.1109/infcom.2010.5462174

Google Scholar

[4] Jhon Bethencourt, Amit Sahai, and Brent Waters, Cipher text-Policy Attribute-Based Encryption, IEEE Symposium on Security and Privacy, pp.321-334, (2007).

DOI: 10.1109/sp.2007.11

Google Scholar

[5] Melissa Chase Multi-authority Attribute based Encryption, Theory of Cryptography Conference, Vol. 4392, pp.515-534, (2007).

DOI: 10.1007/978-3-540-70936-7_28

Google Scholar