An efficient hierarchical attribute set based encryption scheme with revocation for outsourcing personal health records in cloud computing

Author(s):  
B. Perumal ◽  
M. Pallikonda Rajasekaran ◽  
S. Duraiyarasan
2014 ◽  
Vol 11 (13) ◽  
pp. 121-127 ◽  
Author(s):  
Danwei Chen ◽  
Linling Chen ◽  
Xiaowei Fan ◽  
Liwen He ◽  
Su Pan ◽  
...  

2020 ◽  
Vol 8 (6) ◽  
pp. 5133-5140

Cloud computing is a novel prototype to provide services via the internet. Most of the fields like banking, industries, educational institutions, and healthcare are storing their applications, data and accessing it through cloud because of its versatility and affordable price. Even though cloud has a many special feature, data security and privacy are the most important issues in a cloud background. Especially in healthcare sector, according to recent report numerous amount of healthcare data breached by unknown websites and hackers, and much healthcare information breaches are occurring around the world for different purposes and still it is vulnerable on account of storing and accessing data through third party cloud servers. Due to many attacks on personal health records data security and privacy in cloud environment, it is a primary task to concentrate on solving this issue because such health information are really sensitive, and playing vital role in decision-making of patients health which wrong decision may spoil patient’s health, life along with health institution’s reputation. To ensure security and privacy, data encryption and authentication are the key technologies which are a technique to secure data and create proof identities to obtain access of data in the system. Conventional password authentication does not provide sufficient security for information to the new means of attacks. So, this paper introduces a framework for data encryption using standard RSA and Hash function and advanced multi factor authentication technique to cloud data access which authenticates the user based on different factors such as contextual, signcryption and iris bio-metric features. This prototype to cloud computing is implemented using open source technology. The proposed advanced system minimizes intermediate data access due to the complexity of key access and strong authentication. The performance of the system has been evaluated using experimental results such as encryption and decryption time, authentication accuracy, execution time.


Sign in / Sign up

Export Citation Format

Share Document