Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique
Rasal Swati A., Pawar B. V.
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Improper use of the data by the storage server or unauthorized access by outside users could be potential threats to their data. People would like to make their sensitive or private data only accessible to the authorized people with credentials they specified. Attribute-based encryption (ABE) is a promising cryptographic approach that achieves a fine-grained data access control. It provides a way of defining access policies based on different attributes of the requester, environment, or the data object. Especially, cipher text- policy attribute-based encryption (CP-ABE) enables an encryption to define the attribute set over a universe of attributes that a decryption needs to possess in order to decrypt the cipher text, and enforce it on the contents. Thus, each user with a different set of attributes is allowed to decrypt different pieces of data per the security policy. This effectively eliminates the need to rely on the data storage server for preventing unauthorized data access, which is the traditional access control approach of such as the reference monitor. A high degree of patient privacy is guaranteed simultaneously by exploiting multi authority ABE. This scheme enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability and efficiency of proposed scheme.
Keywords: Personal health records, cloud computing, data privacy, fine-grained access control, attribute-based encryption
Edition: Volume 3 Issue 12, December 2014
Pages: 2128 - 2130
How to Cite this Article?
Rasal Swati A., Pawar B. V., "A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14946, Volume 3 Issue 12, December 2014, 2128 - 2130
126 PDF Views | 98 PDF Downloads
Similar Articles with Keyword 'Personal health records'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2681 - 2683Efficient and Confident Sharing of Personal Healthcare Records using Attribute Based Encryption in Cloud Computing
Nitin Raut, Seema Singh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3093 - 3098Privacy-Conserved Health Care Information System with Efficient Cloud Security
R. Pradeep, T. P. Dayana Peter
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2128 - 2130A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique
Rasal Swati A., Pawar B. V.
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1877 - 1881Scalable and Secure Sharing in Cloud Computing Using Data Manipulation & Encryption
Aakanksha Maliye, Sarita Patil
Similar Articles with Keyword 'cloud computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
Similar Articles with Keyword 'data privacy'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1534 - 1539Data Anonymization Approach for Data Privacy
Padma L. Gaikwad, M. M. Naoghare
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2347 - 2349A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data
Pratik Bhingardeve, D. H. Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1724 - 1727Privacy Preserving Authenticity Framework for Shared Data Cloud Network
P. Vanitha Sree, K. Narayana Rao
Similar Articles with Keyword 'fine-grained access control'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
Pages: 2025 - 2027Attribute-Based Access Control Scheme for Security of Cloud Storage Systems Using RNS Cryptography
Priya Thomas
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2128 - 2130A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique
Rasal Swati A., Pawar B. V.
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2618 - 2620A Unified Scheme of Hierarchical Attribute-Based Encryption
Syeda Husna Mehanoor, Syeda Ayesha Thainiath
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 432 - 435Review of Scalability and Security Sharing of Personal Health Records Using Attribute-based Encryption in Cloud Computing
K Pradeep Kumar, Ashwini M Sangolkar
Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018
Pages: 980 - 983Secure Forensic Report Retrieval Application using Cipher Text-Policy Attribute-Based Encryption
Vinod I. Jondhale, Manisha Y. Joshi
Similar Articles with Keyword 'attribute-based encryption'
Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1788 - 1790Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data
Amruta N. Deshmukh, Komal B. Bijwe
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 639 - 642A Review On Cloud Storage Architectures
Pallavi D. Dudhe, P. L. Ramteke
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1221 - 1224Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
A. Vineth, John Deva Prasanna
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2627 - 2631Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing
Kamini H. Gonnade, Fazeel Zama