International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 125 | Views: 287

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013 | Popularity: 6.8 / 10


     

Secure Sharing of Personal Health Records in Cloud Computing

B. Raj Kumar, S. Satyanarayana


Abstract: Personal health record, or PHR, is a health record where health data and information related to the care of a patient is maintained by the patient. This stands in contrast with the more widely used electronic medical record, which is operated by institutions (such as a hospital) and contains data entered by clinicians or billing data to support insurance claims. The intention of a PHR is to provide a complete and accurate summary of an individual’s medical history which is accessible online. The health data on a PHR might include patient-reported outcome data, lab results, and data from devices such as wireless electronic weighing scales. Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. Existing Systems In the existing systems, the process uses revocable ABE algorithm. For each patient, the PHR data should be encrypted so that it is scalable with the number of users having access. Also, since there are multiple owners (patients) in a PHR system and every owner would encrypt her PHR files using a different set of cryptographic keys, it is important to reduce the key distribution complexity in such multi-owner settings. Existing cryptographic enforced access control schemes are mostly designed for the single-owner scenarios.


Keywords: PHR, patient-centric, Attribute Based Encryption


Edition: Volume 2 Issue 3, March 2013


Pages: 323 - 325



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
B. Raj Kumar, S. Satyanarayana, "Secure Sharing of Personal Health Records in Cloud Computing", International Journal of Science and Research (IJSR), Volume 2 Issue 3, March 2013, pp. 323-325, https://www.ijsr.net/getabstract.php?paperid=IJSROFF2013112, DOI: https://www.doi.org/10.21275/IJSROFF2013112



Similar Articles

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 1480 - 1485

Feature Selection for Handwriting Digit Recognition Using Convolutional Neural Network

Tarun Patel, Shivansh Tiwari, Vaibhav Dubey, Vaibhav Singh, Dr. Harvendra Kumar

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Experimental Result Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 702 - 707

Image Caption Generator Using Convolutional Neural Network Algorithm

Shaik Parvez

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023

Pages: 306 - 309

A Basic Framework for Policy Updates for the Outsourced Exchange of Private Medical Records

V. Jayaganesh

Share this Article

Downloads: 27 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1720 - 1723

Key Phrase Extraction Using Recurrent Neural Network

Aakib Jabbar, Preeti Sondhi

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article
Top