An Efficient Sharing of Personal Health Records Using DABE in Secure Cloud Environment
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Cloud computing has emerged as one of the most influential paradigms in the IT industry for last few years. Normally data owners and service providers are not in the same trusted domain in cloud computing. Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers, however the information could be exposed to those third party servers and to unauthorized parties. In the existing system, a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and scalable data access control for PHRs, leverage attribute based encryption (ABE) techniques to encrypt each patient’s PHR file. A high degree of patient privacy is guaranteed simultaneously by exploiting multi-authority ABE. In proposed System, introduce the concept of Distributed Attribute-Based Encryption (DABE), where an arbitrary number of parties can be present to maintain attributes and their corresponding secret keys. Also two-level access control model introduced, that combines fine-grained access control, which supports the precise granularity for access rules, and coarse-grained access control, which allows the storage provider to manage access requests while learning only limited information from its inputs. This is achieved by arranging outsourced resources into units called access blocks and enforcing access control at the cloud only at the granularity of blocks.
Authors and Affiliations
T . Parameswaran , S. Vanitha, K. S. Arvind
VirtuaGuard: Intrusion Detection System on Static and Dynamic Web Applications
In this project, we propose an efficient IDS system called as VirtuaGuard system that models the network behavior for multilayered web applications of user sessions across both front-end web (HTTP) requests and back...
LEARNING BEHAVIOR OF ANALYSIS OF HIGHER STUDIES USING DATA MINING
The main concern of providing higher education is to provide quality education to the students and to produce technically qualified professionals. The knowledge is hidden among the educational data set and it i...
A Survey on Image Mining Techniques for Image Retrieval
Image mining is an expansion of data mining in the field of image processing. Image mining handles with the hidden knowledge extraction, image data association and additional patterns which are not clearly gathered i...
Study of ECG Signal Compression using modified discrete cosine and discrete wavelet transforms
A new hybrid two-stage electrocardiogram (ECG) signal compression method based on the modified discrete cosine transform (MDCT) and discrete wavelet transform (DWT) is proposed. The ECG signal is partitioned into blocks...
Reliability Analysis of Nanoscale CMOS Device with HCI Effect
The paper focuses on the reliability due to hot carrier effects of CMOS and the HC effect under high gate voltage stress. How these stress factors vary with operating conditions, the required foundry qualification test d...