Procure Sharing Of Health Records In Cloud Using Attribute Based Encryption

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - October Issue 2013 by IJCTT Journal
Volume-4 Issue-10                           
Year of Publication : 2013
Authors :T. Raj Kumar, G. Charles Babu

MLA

T. Raj Kumar, G. Charles Babu"Procure Sharing Of Health Records In Cloud Using Attribute Based Encryption"International Journal of Computer Trends and Technology (IJCTT),V4(10):3638-3642 October Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:-  Personal health record is an dynamic thinking for the allocate the health record information to one another to get the instant idea about the problem,but with that proposal numbers of issues is there in which the main concern is security of data from the un-authenticated users and hackers. In recent days it is common to hack data stolen data from the hackers or un-authenticated user. To overcome from this problem, in proposed system is,we use cryptographic method to encrypt the information, in cryptography the plain text is changed into chipper text and generate key for the use of user to decrypt that data for use. The algorithm which we are used in this paper is known as ABE (Attribute Based Encryption), the encryption is based on data attribute, on the basis of condition the encryption is working. In this algorithm the file will be encrypted under up to its attribute and key generation for decrypt the data for the usage of readable file, the public key is send to the users who are registered for share the data on its requirement.

 

References -

[1]A. Sahai, J. Bethencourt, and B. Waters. Ciphertext-Policy Attribute-BasedEncryption.In 2007.
[2]G. Bleumer, M. Blaze, and M. Strauss. Divertible Protocols and Atomic Proxy inCryptography.In Proc. of EUROCRYPT ’98, Espoo, Finland, 1998.
[3]V. Goyal,Boldyreva, and V. Kumar. Identity-based Encryption with EfficientCancellation. In Proc. of CCS’08, Virginia ,Alexandria, USA, 2008.
[4]D. Boneh and M. Franklin. Identity-Based Encryption from The Weil Pairing.In Proc. of CRYPTO’01, Santa Barbara, California, USA, 2001.
[5]S. Yu, K. Ren, J. Li. Defending , W. Lou, and Against Key Abuse Attacksin KP-ABE Enabled Program Systems. In Proc. of Securecomm’09, Athens,Greece, 2009.
[6]S. Narayan, R.Safavi-Naini, M. Gagn´e, and“Privacy preservingehr system using attribute-based infrastructure,” ser. CCSW ’10,2010, pp. 47–52.
[7]X. Liang, R. Lu, X. Lin, and X. S. Shen, “Patient self-controllableaccess policy on phi in ehealthcare systems,” in AHIC 2010, 2010.
[8]L. Ibraimi, M. Asim, and M. Petkovic, “Secure management ofpersonal health records by applying attribute-based encryption,”.
[9]J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policyattribute-based encryption,” in IEEE S& P ’07, 2007, pp. 321–334.
[10]A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler,“Spins: security protocols for sensor networks,” Wirel. Netw.,vol. 8, pp. 521–534, September 2002.

Keywords :— Cloud computing, cryptography, attribute, security.