Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
Scalable and Secure Sharing in Cloud Computing Using Data Manipulation & Encryption
Aakanksha Maliye, Sarita Patil
Personal health record is using for maintaining the patients personal and diagnoses information using one centralize server. Under the health information exchange server PHR is an emerging patient centric data model which is supposed to be outsources on the third party servers like cloud servers. The security scheme are mostly used for provide security of personal health record form public access at online. In this paper used encryption method is a promising method to assure patients control over their own PHRs before outsourcing. Few such issues like privacy concern, scalability, flexibility and efficient user revocation are remained the most important challenges. To achieve secured and scalable data access control for PHRs, in this paper leverage attribute based encryption technique to encrypt each patients PHR file. Different from existing system in secure data outsourcing, in this paper focus on the multiple data owner scenario in PHR system into multiple security domain that greatly reduce the key management complexity for owners & users. The paper is also enables user revocation on dynamic modification of access policies or file attribute.
Keywords: Cloud computing, data privacy, personal health records, attribute-based encryption, file based encryption, attribute revocation
Edition: Volume 4 Issue 7, July 2015
Pages: 1877 - 1881
How to Cite this Article?
Aakanksha Maliye, Sarita Patil, "Scalable and Secure Sharing in Cloud Computing Using Data Manipulation & Encryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156797, Volume 4 Issue 7, July 2015, 1877 - 1881
121 PDF Views | 104 PDF Downloads
Similar Articles with Keyword 'Cloud computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
Similar Articles with Keyword 'data privacy'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1534 - 1539Data Anonymization Approach for Data Privacy
Padma L. Gaikwad, M. M. Naoghare
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1598 - 1601A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web
Supriya S. Sankpal, Rupali A. Mahajan
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1948 - 1954A New Security Business Frame work for Resource Attestation in cloud Environment
Vallabhaneni. Hema Latha, Kolluru. Suresh Babu
Similar Articles with Keyword 'personal health records'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2681 - 2683Efficient and Confident Sharing of Personal Healthcare Records using Attribute Based Encryption in Cloud Computing
Nitin Raut, Seema Singh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3093 - 3098Privacy-Conserved Health Care Information System with Efficient Cloud Security
R. Pradeep, T. P. Dayana Peter
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2128 - 2130A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique
Rasal Swati A., Pawar B. V.
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2162 - 2165SPOC for M-Healthcare using ABE
Latha PH, Asha N
Similar Articles with Keyword 'attribute-based encryption'
Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1788 - 1790Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data
Amruta N. Deshmukh, Komal B. Bijwe
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 639 - 642A Review On Cloud Storage Architectures
Pallavi D. Dudhe, P. L. Ramteke
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1324 - 1327Enhancing Organization Security using Attribute-Based Encryption for Data Sharing
Priya D. Tangde, A. S. Chhajed
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
Pages: 1553 - 1555A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentication
Manju Lakshmi, Anju Rachel Oommen, Smita C Thomas
Similar Articles with Keyword 'attribute revocation'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2128 - 2130A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique
Rasal Swati A., Pawar B. V.
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1912 - 1915Secure and Efficient Data Sharing for Decentralized DTN
Gauri N. Salodkar, Komal B. Bijwe
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 165 - 173Decentralized Firewall for Attribute-Based Encryption with Verifiable and Revocable Cloud Access Control
Shintomon Mathew, George T. Vadakkumcheril, T. Justin Jose
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1877 - 1881Scalable and Secure Sharing in Cloud Computing Using Data Manipulation & Encryption
Aakanksha Maliye, Sarita Patil