International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 125

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013


Secure Sharing of Personal Health Records in Cloud Computing

B. Raj Kumar | S. Satyanarayana


Abstract: Personal health record, or PHR, is a health record where health data and information related to the care of a patient is maintained by the patient. This stands in contrast with the more widely used electronic medical record, which is operated by institutions (such as a hospital) and contains data entered by clinicians or billing data to support insurance claims. The intention of a PHR is to provide a complete and accurate summary of an individual’s medical history which is accessible online. The health data on a PHR might include patient-reported outcome data, lab results, and data from devices such as wireless electronic weighing scales. Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. Existing Systems In the existing systems, the process uses revocable ABE algorithm. For each patient, the PHR data should be encrypted so that it is scalable with the number of users having access. Also, since there are multiple owners (patients) in a PHR system and every owner would encrypt her PHR files using a different set of cryptographic keys, it is important to reduce the key distribution complexity in such multi-owner settings. Existing cryptographic enforced access control schemes are mostly designed for the single-owner scenarios.


Keywords: PHR, patient-centric, Attribute Based Encryption


Edition: Volume 2 Issue 3, March 2013,


Pages: 323 - 325


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

B. Raj Kumar, S. Satyanarayana, "Secure Sharing of Personal Health Records in Cloud Computing", International Journal of Science and Research (IJSR), Volume 2 Issue 3, March 2013, pp. 323-325, https://www.ijsr.net/get_abstract.php?paper_id=IJSROFF2013112

Similar Articles with Keyword 'PHR'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 1480 - 1485

Feature Selection for Handwriting Digit Recognition Using Convolutional Neural Network

Tarun Patel | Shivansh Tiwari | Vaibhav Dubey | Vaibhav Singh | Dr. Harvendra Kumar

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Experimental Result Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 702 - 707

Image Caption Generator Using Convolutional Neural Network Algorithm

Shaik Parvez [2]

Share this Article
Top