Downloads: 125 | Views: 287
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013 | Popularity: 6.8 / 10
Secure Sharing of Personal Health Records in Cloud Computing
B. Raj Kumar, S. Satyanarayana
Abstract: Personal health record, or PHR, is a health record where health data and information related to the care of a patient is maintained by the patient. This stands in contrast with the more widely used electronic medical record, which is operated by institutions (such as a hospital) and contains data entered by clinicians or billing data to support insurance claims. The intention of a PHR is to provide a complete and accurate summary of an individual’s medical history which is accessible online. The health data on a PHR might include patient-reported outcome data, lab results, and data from devices such as wireless electronic weighing scales. Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. Existing Systems In the existing systems, the process uses revocable ABE algorithm. For each patient, the PHR data should be encrypted so that it is scalable with the number of users having access. Also, since there are multiple owners (patients) in a PHR system and every owner would encrypt her PHR files using a different set of cryptographic keys, it is important to reduce the key distribution complexity in such multi-owner settings. Existing cryptographic enforced access control schemes are mostly designed for the single-owner scenarios.
Keywords: PHR, patient-centric, Attribute Based Encryption
Edition: Volume 2 Issue 3, March 2013
Pages: 323 - 325
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 1480 - 1485Feature Selection for Handwriting Digit Recognition Using Convolutional Neural Network
Tarun Patel, Shivansh Tiwari, Vaibhav Dubey, Vaibhav Singh, Dr. Harvendra Kumar
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Experimental Result Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 702 - 707Image Caption Generator Using Convolutional Neural Network Algorithm
Shaik Parvez
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 306 - 309A Basic Framework for Policy Updates for the Outsourced Exchange of Private Medical Records
V. Jayaganesh
Downloads: 27 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021
Pages: 1720 - 1723Key Phrase Extraction Using Recurrent Neural Network
Aakib Jabbar, Preeti Sondhi
Downloads: 105
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1737 - 1740Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad