Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Conjunctive catchword scan with Designated analyser and timing enabled proxy re-encryption method for e-health clouds

Author : Koustuba A 1 Lakshmi N 2 Leelavathi S 3 Salma Arifa Farzana 4 Ravindra Prasad S 5

Date of Publication :13th June 2017

Abstract: An electronic health (e-health) record framework is a novel requisition that will achieve incredible comfort in health awareness. The protections and security of the delicate data aid the major worries of the users, which will thwart further improvement and broadly reception of the frameworks. The searchable Encryption (SE) plan will be a innovation organization with fuse security protection moreover ideal operability capacities together, which plays a fundamental part in the e-health record framework. In this paper, we present a novel cryptographic primitive named as conjunctive Catchword scan with designated analyzer and timing enabled proxy re-encryption capacity, which is a sort of a time-dependent SE plan. It could empower patients to represent fractional entry privileges to others to perform search operation over their records within a restricted time period. The period of the time for the delegatee to search and decrypt the delegator’s encrypted documents could be regulated. Moreover, the delegatee could be naturally denied of access power after a specified time. It can be backing the conjunctive keywords search and Oppose keyword guessing strike. We define a system model and a security model for proposed plan to indicate that it is an effective plan demonstrated secure in the standard model.

Reference :

    1. J. C. Leventhal, J. A. Cummins, P. H. Schwartz, D. K. Martin, and W. M. Tierney, “Designing a system for patients controlling providers‟ access to their electronic health records: Organizational and technical challenges,” J. General Internal Med., vol. 30, no. 1, pp. 17– 24, 2015.
    2. Microsoft. Microsoft HealthVault. [Online]. Available: http://www. healthvault.com, accessed May 1, 2015.
    3. Google Inc. Google Health. [Online]. Available: https://www. google.com/health, accessed Jan. 1, 2013.
    4. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Proc. EUROCRYPT, vol. 3027. Interlaken, Switzerland, May 2004, pp. 506–522.

Recent Article