Open Access   Article Go Back

Facilitating Secure Cloud Based Mobile Healthcare Application using Encryption Techniques

Praneeta K. Maganti1 , Pushpanjali M. Chouragade2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 973-977, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.973977

Online published on Apr 30, 2019

Copyright © Praneeta K. Maganti, Pushpanjali M. Chouragade . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Praneeta K. Maganti, Pushpanjali M. Chouragade, “Facilitating Secure Cloud Based Mobile Healthcare Application using Encryption Techniques,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.973-977, 2019.

MLA Style Citation: Praneeta K. Maganti, Pushpanjali M. Chouragade "Facilitating Secure Cloud Based Mobile Healthcare Application using Encryption Techniques." International Journal of Computer Sciences and Engineering 7.4 (2019): 973-977.

APA Style Citation: Praneeta K. Maganti, Pushpanjali M. Chouragade, (2019). Facilitating Secure Cloud Based Mobile Healthcare Application using Encryption Techniques. International Journal of Computer Sciences and Engineering, 7(4), 973-977.

BibTex Style Citation:
@article{Maganti_2019,
author = {Praneeta K. Maganti, Pushpanjali M. Chouragade},
title = {Facilitating Secure Cloud Based Mobile Healthcare Application using Encryption Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {973-977},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4153},
doi = {https://doi.org/10.26438/ijcse/v7i4.973977}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.973977}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4153
TI - Facilitating Secure Cloud Based Mobile Healthcare Application using Encryption Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Praneeta K. Maganti, Pushpanjali M. Chouragade
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 973-977
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
389 286 downloads 157 downloads
  
  
           

Abstract

Cloud computing comes with higher potential in improving the healthcare services provided to patients and also promises increase in the access of qualitative healthcare services and reduction in the healthcare expenses. Even though cloud computing puts an end to the concerns regarding investment in hardware infrastructure and its maintenance by hospitals, expenses by patients and faster access of health records by both patients and doctors without interruption in service, it is still discerned as unsafe because of the security threats it faces. The patient’s health information is prone to loss, unauthorized access, misuse, coercing and altering. This can be avoided by encrypting the data before handing it over for cloud storage. This paper comprises the study of various encryption schemes which can be put to use for securing the patient’s sensitive health information on cloud along with the implementation and performance analysis of a mobile healthcare application which encrypts the health records of patients before outsourcing it for storage over cloud and ensures effective access control, secrecy and integrity of health information.

Key-Words / Index Term

Cloud computing, healthcare, encryption, mobile healthcare application, integrity

References

[1] D. Boneh and M. Franklin, “Identity-based Encryption from the Weil Pairing”, In. Kilian J. (eds) Advances in Cryptology, CRYPTO 2001, Lecture Notes in Computer Science, Vol.2139, pp.213-229, 2001.
[2] R. Lakshmi, R. Lavanya, M. Meenakshi, Dr. C. Dhas, “Analysis of Attribute Based Encryption Schemes”, International Journal of Computer Science and Engineering Communications, Vol.3, Issue.3, pp.1076-1081, 2015.
[3] Abbas and S. U. Khan, “A Review on the State-of-the-Art Privacy Preserving Approaches in the e-Health Clouds”, IEEE Journal of Biomedical and Health Informatics, Vol.18, Issue.4, pp.1431-1441, 2014.
[4] A. Fiat and M. Naor, “Broadcast Encryption”, In. Stinson D. R. (eds) Advances in Cryptology, CRYPTO 1993, Vol.773, pp.480-491, 1993.
[5] C. Delerablee, “Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys”, In. Kurosawa K. (eds) Advances in Cryptology, ASIACRYPT 2007, Lecture Notes in Computer Science, Vol.4833, pp.200-215, 2007.
[6] D. Lubicz and T. Sirvent, “Attribute-Based Broadcast Encryption Scheme Made Efficient”, In. Vaudenay S. (eds) Progress in Cryptology, AFRICACRYPT 2008, Lecture Notes in Computer Science, Vol.5023, pp.325-342, 2008.
[7] Q. Huang, W. Yeu, Y. He and Y. Yang, “Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing”, IEEE Access Special Section on Cyber-Threats and Countermeasurs in the Healthcare Sector, Vol.6, pp.36584-36594, 2018.
[8] M. Blaze, G. Bleumer and M. Strauss, “Divertible Protocols and Atomic Proxy Cryptography”, In. Nyberg K. (eds) Advances in Cryptology, EUROCRYPT’98, Lecture Notes in Computer Science, Vol.1403, pp.127-144, 2006.
[9] M. Green, G. Anteniese, “Identity-based Proxy re-encryption”, In. Katz J., Yung M. (eds) Applied Cryptography and Network Security, ACNS 2007, Vol.4521, pp.288-306, 2007.
[10] K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, y. Yu and A. Yang, “A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing”, Future Generation Computer System, Vol.52, pp.95-108, 2014.
[11] J. Weng, R. H. Deng, X. Ding, C. Chu and J. Lai, “Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack”, Proceedings of the 4th International Symposium on Information, Computer, and Communication Security,ASIACCS’09, pp.322-332, 2009.
[12] D. Boneh, G. D. Crescenzo, R. Ostrovsky and G. Persiano, “Public Key Encryption with Keyword Search”, Proceedings of EUROCRYPT, Interlaken, pp.542-545, 2004.
[13] G. Yang, C. Tan, Q. Huang and D. Wong, “Probabilistic Public Key Encryption with Equality Test”, In. Pieprzyk J. (eds) Topics in Cryptology-CT-RSA 2010, Lecture Notes in Computer Science, Vol.5985, pp.119-131, 2010.
[14] S. Ma, “Identity-based encryption with outsourced equality test in cloud computing”, Information Sciences, Vol.328, pp.389-402, 2016.