Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable

2021 ◽  
pp. 1-34
Author(s):  
Isaac Amankona Obiri ◽  
Qi Xia ◽  
Hu Xia ◽  
Eric Affum ◽  
Smahi Abla ◽  
...  

The distribution of personal health records (PHRs) via a cloud server is a promising platform as it reduces the cost of data maintenance. Nevertheless, the cloud server is semi-trusted and can expose the patients’ PHRs to unauthorized third parties for financial gains or compromise the query result. Therefore, ensuring the integrity of the query results and privacy of PHRs as well as realizing fine-grained access control are critical key issues when PHRs are shared via cloud computing. Hence, we propose new personal health records sharing scheme with verifiable data integrity based on B+ tree data structure and attribute-based signcryption scheme to achieve data privacy, query result integrity, unforgeability, blind keyword search, and fine-grained access control.

PLoS ONE ◽  
2018 ◽  
Vol 13 (11) ◽  
pp. e0207543 ◽  
Author(s):  
Jin Sun ◽  
Xiaojing Wang ◽  
Shangping Wang ◽  
Lili Ren

2018 ◽  
Vol 7 (2.7) ◽  
pp. 367
Author(s):  
Dr R. Bulli Babu ◽  
P Jagadeesh ◽  
S Sonia

Unique wellbeing record (PHR)1 will be kept up in the bound together server should keep up the patients near home and PHR administra-tions would outsourced should outcast pro co-ops. Those essential concerns may be around examination information. Those tolerant records ought to make if those patients Might truly control those advertising kept up with helter-skelter2 security which is more security. The securi-ty plans are used to protect that particular information from general population get. Tolerant information could make accessed Eventually Tom's perusing A large number distinctive individuals. Each power will be doled out with right reasonably for a specific situated of qualities. The entry control and protection management is an intricate assignment in the tolerant wellbeing record oversaw economy methodology. Conveyed registering may be a casual statement used to depict a combination about Different sorts about registering thoughts that incorpo-rate endless that would chortle through a continuous correspondence a. It may be an identical word to passed on preparing over an arrange-ment and methods those abilities will run a system around a number chortled Pcs meanwhile majority of the data proprietors invigorate those singular data under outcast cloud server ranches. Those novel patient-driven framework Also a suited from claiming data get will instruments will control PHR1 set far over semi-put stock Previously, servers. On finish fine-grained What's more versant majority of the data get will control to PHRs, we utilize quality built encryption (ABE) methodologies on scramble each patient's PHR1 record. Different data proprietors3 camwood get should comparable data values. Those recommended arrangement Might a chance to be arrived at out to pro-gressive quality built encryption (HABE) for get to control part. 


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 102887-102901 ◽  
Author(s):  
Shangping Wang ◽  
Dan Zhang ◽  
Yaling Zhang

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Yu Lin ◽  
Lingling Xu ◽  
Wanhua Li ◽  
Zhiwei Sun

A personal health record (PHR) is an electronic application which enables patients to collect and share their health information. With the development of cloud computing, many PHR services have been outsourced to cloud servers. Cloud computing makes it easier for patients to manage their personal health records and makes it easier for doctors and researchers to share and access this information. However, due to the high sensitivity of PHR, a series of security protections are needed to protect them, such as encryption and access control. In this article, we propose an attribute set-based Boolean keyword search scheme, which can realize fine-grained access control and Boolean keyword search over encrypted PHR. Compared with the existing attribute-based searchable encryption, our solution can not only improve the flexibility in specifying access policies but also perform Boolean keyword search, which can meet the needs of large-scale PHR users. Furthermore, we simulate our scheme, and the experimental results show that our scheme is practical for PHR systems in cloud computing.


2019 ◽  
Vol 23 (3) ◽  
pp. 1278-1289 ◽  
Author(s):  
Wei Li ◽  
Bonnie M. Liu ◽  
Dongxi Liu ◽  
Ren Ping Liu ◽  
Peishun Wang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document