International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120 | Views: 305

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.8 / 10


     

Scalable and Secure Sharing in Cloud Computing Using Data Manipulation & Encryption

Aakanksha Maliye, Sarita Patil


Abstract: Personal health record is using for maintaining the patients personal and diagnoses information using one centralize server. Under the health information exchange server PHR is an emerging patient centric data model which is supposed to be outsources on the third party servers like cloud servers. The security scheme are mostly used for provide security of personal health record form public access at online. In this paper used encryption method is a promising method to assure patients control over their own PHRs before outsourcing. Few such issues like privacy concern, scalability, flexibility and efficient user revocation are remained the most important challenges. To achieve secured and scalable data access control for PHRs, in this paper leverage attribute based encryption technique to encrypt each patients PHR file. Different from existing system in secure data outsourcing, in this paper focus on the multiple data owner scenario in PHR system into multiple security domain that greatly reduce the key management complexity for owners & users. The paper is also enables user revocation on dynamic modification of access policies or file attribute.


Keywords: Cloud computing, data privacy, personal health records, attribute-based encryption, file based encryption, attribute revocation


Edition: Volume 4 Issue 7, July 2015


Pages: 1877 - 1881



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Aakanksha Maliye, Sarita Patil, "Scalable and Secure Sharing in Cloud Computing Using Data Manipulation & Encryption", International Journal of Science and Research (IJSR), Volume 4 Issue 7, July 2015, pp. 1877-1881, https://www.ijsr.net/getabstract.php?paperid=SUB156797



Similar Articles

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 4, April 2024

Pages: 1127 - 1135

Generative Artificial Intelligence: Unveiling the Potential and Challenges

Brahmaleen Kaur Sidhu

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 1758 - 1765

Enhancing Corporate Financial Performance Through AI: A Novel AI Model for Forecasting Organizational Risk Management, CRM, and Operational Efficiency

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article



Top