Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Attribute Based Encryption for Securing Personal Health Record on Cloud

Author : Deepali A.Gondkar 1 Nisha.A.Auti 2 Nilofer U.Sayyed 3

Date of Publication :12th April 2018

Abstract: Personal health record (PHR) has emerged as a patient-centric model of health information exchange. A PHR service allows a patient to create, manage, and control her personal health data in one place through the web, which has made the storage, retrieval, and sharing of the medical information more efficient. Especially, each patient is promised the full control of her medical records and can share her health data with a wide range of users, including healthcare providers, family members or friends. The main aim of this research work is to propose a novel framework of secure sharing of personal health records in cloud computing. Considering partially trustworthy cloud servers, we argue that to fully realize the patient-centric concept, patients shall have complete control of their own privacy through encrypting their PHR files to allow fine-grained access.

Reference :

    1. Ming Li Member,IEEE,Shucheng Yu, IEEE, Yao Zheng, Student Member ,IEEE,KuiRen Senior Member,IEEE,andWenjing Lou,Senior Member,IEEE,”,Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attributebased Encryption ,”IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEMS VOL. XX,NO. XX,XX 2012.
    2. M.Li,S.Yu,K.Ren, and W. Lou,” Securing personal health records in cloud computing patient-centric and fine- grained dataaccess control in multi-owner settings,” in SecureComm‟10,Sept 2010,pp.89-106.
    3. S.Yu.C.Wang, K.Ren and W. Lou, “Achieving secure scalable and fine grained data access control in cloud computing , ” in IEEE INFOCOM‟10,2010.
    4. A.Boldyreva, V.Goyal, and V.Kumar,”Identity-based encryption with efficient revocation,” in ACM CCS, ser. CCS ‟08,2008,pp.417-426.
    5. M. Pirretti, P. Traynor, P.McDaniel, and B. Waters, “Secure attribute-based systems” Journal of Computer Security, vol. 18, no 5,pp 799-837,2010.
    6. B.Lynn, “The pbc library,”http://crypto.stanford.edu /pbc/.
    7. Y.Zheng, “Key-policy attribute based encryption scheme implementation,”http://www.cnsr.ictas.vt.edu /resources.html.

Recent Article