Open Access   Article Go Back

Encryption Schemes for Securing Cloud-based PHR Systems

Shruthi Suresh1

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-12 , Page no. 6-10, Dec-2014

Online published on Dec 31, 2014

Copyright © Shruthi Suresh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shruthi Suresh , “Encryption Schemes for Securing Cloud-based PHR Systems,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.6-10, 2014.

MLA Style Citation: Shruthi Suresh "Encryption Schemes for Securing Cloud-based PHR Systems." International Journal of Computer Sciences and Engineering 2.12 (2014): 6-10.

APA Style Citation: Shruthi Suresh , (2014). Encryption Schemes for Securing Cloud-based PHR Systems. International Journal of Computer Sciences and Engineering, 2(12), 6-10.

BibTex Style Citation:
@article{Suresh_2014,
author = {Shruthi Suresh },
title = {Encryption Schemes for Securing Cloud-based PHR Systems},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2014},
volume = {2},
Issue = {12},
month = {12},
year = {2014},
issn = {2347-2693},
pages = {6-10},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=321},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=321
TI - Encryption Schemes for Securing Cloud-based PHR Systems
T2 - International Journal of Computer Sciences and Engineering
AU - Shruthi Suresh
PY - 2014
DA - 2014/12/31
PB - IJCSE, Indore, INDIA
SP - 6-10
IS - 12
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3632 3558 downloads 3624 downloads
  
  
           

Abstract

Presently, Personal Health Records are widely used by people not only to store their health details, but also to share their health information among doctors, friends, relatives, medical organizations etc. Health records are now stored and shared with the help of cloud services. The sensitive nature of these health records makes it vulnerable to attacks. To ensure privacy of health information, the best method is to encrypt it. In this paper, Attribute Based Encryption and its variants are studied so that they can be used for developing an efficient health record sharing scheme which is more flexible and scalable.

Key-Words / Index Term

Personal Health Record (PHR) ; Cloud Computing ; Attribute Based Encryption (ABE) ; MA-ABE ; Proactive MA-ABE; CA ;Data Privacy ; Fine-grained access control

References

[1] M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure Attribute Based Systems,” Journal of Computer Security, vol. 18, no. 5, pp. 799–837, 2010.
[2] V. Goyal, O.Pandey, A. Sahai, and B. Waters. “Attribute- Based Encryption for Fine-grained Access Control of Encrypted Data”, Proc. 13th ACM Conf. Computer and Comm. Security (CCS ’06), pp. 89-98, 2006.
[3] D.Boneh and M. Franklin. “Identity-Based Encryption from the Weil Pairing.” Proc. of CRYPTO’01, Santa Barbara, California, USA, 2001.
[4] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy Attribute Based encryption,” in IEEE S& P ’07, 2007, pp. 321- 334.
[5] Ramasamy S, Vahidhunnisha, ” Survey on Multi Authority Attribute Based Encryption for Personal Health Record in Cloud Computing”, International Journal of Latest Trends in Engineering and Technology, November 2013, pp.223- 229.
[6] Herzberg etc, “proactive secrete sharing(PSS),” in 1995
[7] Cheng-chir Lee, Pei-shan C,” A survey on ABE scheme of Access control in cloud environment, vol.15, no.4, July 2013, pp.231-240.
[8] Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao,”Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority,” INDOCRYPT, 2008, pp. 426-436.
[9] Neetha Xavier, “Security of PHR in cloud computing using ABE technique”, International Journal of Communication and Computer Technologies, volume 01-No.72 issue: 07, Nov 2013, pp. 265-269.
[10] S.Jahid, P.Mittal, N.Borisov,”Easier: Encryption- Based Access Control in Social Networks with Efficient Revocation,” Proc. ACMSynp. Information, Computer and Comm.Security, Mar 2011.