M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015
Implementation of Mobile-Healthcare using Cloud Computing with Access Control, Security and Privacy
Smitha Kr, Rajashekar SA
Distributed m-healthcare cloud computing system significantly facilitates efficient patient treatment for medical consultation by sharing personal health information among healthcare providers. However, it brings about the challenge of keeping both the data confidentiality and patients identity privacy simultaneously. Many existing access control and anonymous authentication schemes cannot be straightforwardly exploited. To solve the problem, in this paper, a novel authorized accessible privacy model (AAPM) is established. Patients can authorize physicians by setting an access tree supporting flexible threshold predicates. Then, based on it, by devising a new technique of attribute-based designated verifier signature, a patient selfcontrollable multi-level privacy-preserving cooperative authentication scheme (PSMPA) realizing three levels of security and privacy requirement in distributed m-healthcare cloud computing system is proposed. The directly authorized physicians, the indirectly authorized physicians and the unauthorized persons in medical consultation can respectively decipher the personal health information and/or verify patients identities by satisfying the access tree with their own attribute sets. Finally, the formal security proof and simulation results illustrate our scheme can resist various kinds of attacks and far outperforms the previous ones in terms of computational, communication and storage overhead
Keywords: Authentication, access control, security and privacy, distributed cloud computing, m-healthcare system
Edition: Volume 4 Issue 4, April 2015
Pages: 97 - 106
How to Cite this Article?
Smitha Kr, Rajashekar SA, "Implementation of Mobile-Healthcare using Cloud Computing with Access Control, Security and Privacy", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152821, Volume 4 Issue 4, April 2015, 97 - 106
130 PDF Views | 129 PDF Downloads
Similar Articles with Keyword 'Authentication'
Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
A Survey on Existing Password Storage Methods and their Security
Samruddhi Patil, Kumud Wasnik
Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Similar Articles with Keyword 'access control'
Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution
Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga
A Survey on the Various Techniques of Data Leakage Detection
Saranya S. Devan, Minu Lalitha Madhavu
Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad
SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.
Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing
Sagar S. Sanghavi, Rajesh A. Auti