International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Science , Computer Science and Engineering

Volume5,January 2018,

Topic : Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

Authors:G.Hema || Dr.K.Sreenivasa Rao, N.Srinivas

Abstract:An electronic health (e-health) record system is a novel application that will bring great convenience in healthcare. The privacy and security of the sensitive personal information are the major concerns of the users, which could hinder further development and widespread adoption of the systems. The searchable encryption (SE) scheme is a technology to incorporate security protection and favorable operability functions together, which can play an important role in the e-health record system. In this paper, we introduce a novel cryptographic primitive named as conjunctive keyword search with designated tester and timing enabled proxy re-encryption function (Re-dtPECK), which is a kind of a time-dependent SE scheme. It could enable patients [1] to delegate partial access rights to others to operate search functions over their records in a limited time period. The length of the time period for the delegatee to search and decrypt the delegator’s encrypted documents can be controlled. Moreover, the delegatee could be automatically deprived of the access and search authority after a specified period of effective time. It can also support the conjunctive keywords search and resist the keyword guessing attacks. By the solution, only the designated tester is able to test the existence of certain keywords. We formulate a system model and a security model for the proposed Re-dtPECK scheme to show that it is an efficient scheme proved secure in the standard model. The comparison and extensive simulations demonstrate that it has a low computation and storage overhead.


Download Paper

DOI: 01.1617/vol5/iss1/pid17365

Related Articles

Wormhole Attack Prevention and Detection Approaches in Mobile Ad hoc Networks: A Survey.

Authors: Avinash Singh || Ram Singar Verma

Doi : 01.1617/vol4/iss03/pid34591

Volume4 ,March 2018.

Developing a GIS Platform for Tourism marketing and promotion In Nigeria: Case Study Of Bauchi State

Authors: Abubakar Siddiq Ango || Abdulsalam Waheed Abdulfatah, Idrissa Djibo

Doi : 01.1617/vol3/iss09/pid91783

Volume3 ,September 2018.

Decentralized Trust Management and Trust Worthiness of Cloud Environments

Authors: Qhubaib Syed || Syed Afzal Ahmed,Syed Abdul Haq

Doi : 01.1617/vol4/iss4/pid21386

Volume4 ,April 2018.

Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients

Authors: Sindhura Rao || Ashwini S,Kusuma Mohanchandra

Doi : 01.1617/vol4/iss4/pid82074

Volume4 ,April 2018.

Multilevel Authentication System

Authors: Nichita Silva Lobo || Beverly Rodrigues,Pavni Alluri,Prathibha Singh,Nicole Alvares

Doi : 01.1617/vol4/iss4/pid82135

Volume4 ,April 2018.

Stock Prediction Using Clustering And Regression Techniques

Authors: Shalini Lotlikar || Megha Ainapurkar

Doi : 01.1617/vol4/iss4/pid39708

Volume4 ,April 2018.

Brain Tumor Detection using Image Segmentation

Authors: Siddhi N. Nerurkar ||

Doi : 01.1617/vol4/iss4/pid02845

Volume4 ,April 2018.

Video Mining using Query by Example

Authors: Rosebud Valadares ||

Doi : 01.1617/vol4/iss4/pid89542

Volume4 ,April 2018.

Fuzzy Opinion Mining for Product Recommender System

Authors: Aarti Bandodker ||

Doi : 01.1617/vol4/iss4/pid03652

Volume4 ,April 2018.

Aadhaar and Server based Electoral system

Authors: Yugansh Garg || Sakshi Mishra

Doi : 01.1617/vol4/iss4/pid69053

Volume4 ,April 2018.



Editor Image

Dr. Allon Guez
Professor, Drexel University,

View more



Google Scholar Profile

Thomson Reuters ID : q-6288-2016.
ORCiD Research ID : 0000-0001-9540-6799

All Issues


Journal Code : IJERCSE
Electronic ISSN : 2394-2320
Impact Factor : 4.890
Frequency : monthly
Contact :