CFP last date
20 May 2024
Reseach Article

PHR Model using Cloud Computing and Attribute based Encryption

by Pooja K. Patil, P. M. Pawar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 18
Year of Publication: 2013
Authors: Pooja K. Patil, P. M. Pawar
10.5120/11024-5488

Pooja K. Patil, P. M. Pawar . PHR Model using Cloud Computing and Attribute based Encryption. International Journal of Computer Applications. 65, 18 ( March 2013), 21-24. DOI=10.5120/11024-5488

@article{ 10.5120/11024-5488,
author = { Pooja K. Patil, P. M. Pawar },
title = { PHR Model using Cloud Computing and Attribute based Encryption },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 18 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number18/11024-5488/ },
doi = { 10.5120/11024-5488 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:19:11.594461+05:30
%A Pooja K. Patil
%A P. M. Pawar
%T PHR Model using Cloud Computing and Attribute based Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 18
%P 21-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing, is an emerging computing environment which allows users to remotely store the data in one centralized place. This facilitates on demand scalable services as well as efficient management and sharing of data. However, there have been wide privacy concerns as data is outsourced to third party servers and to unauthorized users. The best way to ensure confidentiality of the data in the cloud is to utilize encryption/decryption for data in transit and data at rest. Data encryption/decryption technique can be applied on both coarse-grained level and fine grained level but in both techniques it is required to give another party your private key. Hence Key management becomes a critical issue and the cloud provider require policies and procedures in place for storage, generation and archival of private keys. To achieve scalability in key management, ?exible access and efficient user revocation an attribute based encryption (ABE) technique has been recently popularized. Using ABE records are encrypted at fine-grained level instead of coarse grain level which helps in scalable data access control. The paper discusses the use of cloud computing and cryptographic techniques i. e. (ABE) for Personal health record (PHR). PHR is an upcoming patient-centric model for storing patients' e-record in one centralized place. It allows patients to create, manage, control and share their health information with other users as well as health care providers.

References
  1. "Google, microsoft say hipaa stimulus rule doesn't apply tothem," http://www. ihealthbeat. org/Articles/2009/4/8/.
  2. "The health insurance portability and accountability act. "[Online]. Available:http://www. cms. hhs. gov/HIPAAGenInfo/01 Overview. asp
  3. K. D. Mandl, P. Szolovits, and I. S. Kohane, "Public standards and patients' control: how to keep electronic medical records accessible but private," BMJ, vol. 322, no. 7281, p. 283, Feb. 2001.
  4. J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient controlledencryption: ensuring privacy of electronic medical records,"in CCSW '09, 2009, pp. 103–114.
  5. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable,and fine-grained data access control in cloud computing," in IEEEINFOCOM'10, 2010.
  6. J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient controlledencryption: ensuring privacy of electronic medical records,"in CCSW '09, 2009, pp. 103–114.
  7. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for . ne-grained access control of encrypted data," in CCS '06, 2006, pp. 89–98.
  8. Ming Li. , Shucheng Yu, Yao Zheng, Kui Ren, Wenjing Lou" Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption" IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,vol. xx,No. xx,2012
  9. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker,"Ciphertext-policy attribute-based threshold decryption with delegation and revocation of user attributes," 2009.
  10. S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in ASIACCS'10, 2010.
  11. M. Chase and S. S. Chow, "Improving privacy and security in multi-authority attribute-based encryption," in CCS '09, 2009, pp. 121–130.
  12. S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-encryption: management of access control evolution on outsourced data," in VLDB '07, 2007, pp. 123–13
  13. N. Attrapadung and H. Imai, "Conjunctive broadcast and attribute-based encryption," Pairing-Based Cryptography–Pairing 2009, pp. 248–265, 2009.
  14. S. M¨ uller, S. Katzenbeisser, and C. Eckert, "Distributed attributebased encryption," Information Security and Cryptology–ICISC 2008,pp. 20–36, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Attribute based encryption cloud computing MA-ABE fine-grained access control Personal Health Record