scholarly journals Protected Health Care Application In Cloud using Ciphertext-Policy Attribute-Based Encryption And Hierarchical Attribute-Based Encryption

Cloud computing is becoming an emerging paradigm to tenuously store and Share the data for users. A personal health record (PHR) could be a health record during which the patient keeps health data and other information associated with the patient's care. There is a great challenge of privacy and confidentiality once patient shares their records of the commercial cloud servers, that results in less secure. In view of the above, this paper proposes a technique which combines attribute based access control model with an expansion of ciphertext-policy attribute-set-based encryption (ASBE) and Hierarchical Attribute-based Encryption allows to store the sanitized data securely in the cloud system and also the original data may be retrieved from the sanitized data with the help of the key provided by the data owner. The experimentation is carried out on the data sets and it provides superior performance efficient and accurate results. PHR system categorizes the users to multi security domains so as to scale back key management quality

2014 ◽  
Vol 573 ◽  
pp. 588-592
Author(s):  
T.B. Sivakumar ◽  
S. Geetha

Personal Health Record is internet based application that enables individuals to access and coordinates their womb-to-tomb health data. The patients have management over access to their own PHR. To attain security of non-public health records, we have a tendency to use the attribute based secret writing to write in code to inform before outsourcing it. Here we have a tendency to specialize in multiple forms of PHR owner situation and division of non-public health records users into multiple security domains that cut back key management complex for house owners and users. A high degree of patient’s privacy is secured. Our theme offer a personal health record owner full management of his/her information. In depth security and performance analysis shows that the projected theme is very economical.


2020 ◽  
Vol 11 (1) ◽  
pp. 63
Author(s):  
Han-Yu Lin ◽  
Yan-Ru Jiang

Population aging is currently a tough problem of many countries. How to utilize modern technologies (including both information and medical technologies) to improve the service quality of health information is an important issue. Personal Health Record (PHR) could be regarded as a kind of health information records of individuals. A ciphertext policy attribute-based encryption (CP-ABE) is a cryptographic primitive for fine-grained access control of outsourced data in clouds. In order to enable patients to effectively store his medical records and PHR data in medical clouds, we propose an improved multi-user CP-ABE scheme with the functionality of keyword search which enables data users to seek for specific ciphertext in the cloud server by using a specific keyword. Additionally, we adopt an independent proxy server in the proposed system architecture to isolate the communication between clients and the cloud server, so as to prevent cloud servers from suffering direct attacks and also reduce the computational loading of cloud servers. Compared with the previous approach, the proposed encryption algorithm takes less running time and the ciphertext length is also relatively short. Moreover, the procedures of re-encryption and pre-decryption only require one exponentiation computation, respectively.


Mathematics ◽  
2021 ◽  
Vol 10 (1) ◽  
pp. 68
Author(s):  
P. Chinnasamy ◽  
P. Deepalakshmi ◽  
Ashit Kumar Dutta ◽  
Jinsang You ◽  
Gyanendra Prasad Joshi

People can store their data on servers in cloud computing and allow public users to access data via data centers. One of the most difficult tasks is to provide security for the access policy of data, which is also needed to be stored at cloud servers. The access structure (policy) itself may reveal partial information about what the ciphertext contains. To provide security for the access policy of data, a number of encryption schemes are available. Among these, CP-ABE (Ciphertext-Policy Attribute-Based Encryption) scheme is very significant because it helps to protect, broadcast, and control the access of information. The access policy that is sent as plaintext in the existing CP-ABE scheme along with a ciphertext may leak user privacy and data privacy. To resolve this problem, we hereby introduce a new technique, which hides the access policy using a hashing algorithm and provides security against insider attack using a signature verification scheme. The proposed system is compared with existing CP-ABE schemes in terms of computation and expressive policies. In addition, we can test the functioning of any access control that could be implemented in the Internet of Things (IoT). Additionally, security against indistinguishable adaptive chosen ciphertext attacks is also analyzed for the proposed work.


Sign in / Sign up

Export Citation Format

Share Document