Downloads: 120 | Views: 305
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.8 / 10
Scalable and Secure Sharing in Cloud Computing Using Data Manipulation & Encryption
Aakanksha Maliye, Sarita Patil
Abstract: Personal health record is using for maintaining the patients personal and diagnoses information using one centralize server. Under the health information exchange server PHR is an emerging patient centric data model which is supposed to be outsources on the third party servers like cloud servers. The security scheme are mostly used for provide security of personal health record form public access at online. In this paper used encryption method is a promising method to assure patients control over their own PHRs before outsourcing. Few such issues like privacy concern, scalability, flexibility and efficient user revocation are remained the most important challenges. To achieve secured and scalable data access control for PHRs, in this paper leverage attribute based encryption technique to encrypt each patients PHR file. Different from existing system in secure data outsourcing, in this paper focus on the multiple data owner scenario in PHR system into multiple security domain that greatly reduce the key management complexity for owners & users. The paper is also enables user revocation on dynamic modification of access policies or file attribute.
Keywords: Cloud computing, data privacy, personal health records, attribute-based encryption, file based encryption, attribute revocation
Edition: Volume 4 Issue 7, July 2015
Pages: 1877 - 1881
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 4, April 2024
Pages: 1127 - 1135Generative Artificial Intelligence: Unveiling the Potential and Challenges
Brahmaleen Kaur Sidhu
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 1758 - 1765Enhancing Corporate Financial Performance Through AI: A Novel AI Model for Forecasting Organizational Risk Management, CRM, and Operational Efficiency
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1075 - 1080Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques
Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N