SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN
CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION

ABSTRACT:

Personal health record (PHR) is an emerging patient-centric model of health information
exchange, which is often outsourced to be stored at a third party, such as cloud providers.
However, there have been wide privacy concerns as personal health information could be
exposed to those third party servers and to unauthorized parties. To assure the patients’ control
over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing.
Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and
efficient user revocation, have remained the most important challenges toward achieving finegrained, cryptographically enforced data access control.

In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data
access control to PHRs stored in semitrusted servers. To achieve fine-grained and scalable data
access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt
each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on
the multiple data owner scenario, and divide the users in the PHR system into multiple security
domains that greatly reduces the key management complexity for owners and users. A high
degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE. Our
scheme also enables dynamic modification of access policies or file attributes, supports efficient
on-demand user/attribute revocation and break-glass access under emergency scenarios.
Extensive analytical and experimental results are presented which show the security, scalability,
and efficiency of our proposed scheme.

More Related Content

Viewers also liked

2 historia de los juegos olímpicos modernos
2 historia de los juegos olímpicos modernos2 historia de los juegos olímpicos modernos
2 historia de los juegos olímpicos modernos
elenalopezandujar
 
Dotnet secure communication based on ambient audio
Dotnet  secure communication based on ambient audioDotnet  secure communication based on ambient audio
Dotnet secure communication based on ambient audio
Ecwaytech
 
Dotnet region-based foldings in process discovery
Dotnet  region-based foldings in process discoveryDotnet  region-based foldings in process discovery
Dotnet region-based foldings in process discovery
Ecwaytech
 
Dotnet security analysis of a single sign-on mechanism for distributed compu...
Dotnet  security analysis of a single sign-on mechanism for distributed compu...Dotnet  security analysis of a single sign-on mechanism for distributed compu...
Dotnet security analysis of a single sign-on mechanism for distributed compu...
Ecwaytech
 
Clipping YoDona 30/12/11 @ IED Barcelona
Clipping YoDona 30/12/11 @ IED BarcelonaClipping YoDona 30/12/11 @ IED Barcelona
Clipping YoDona 30/12/11 @ IED Barcelona
IED Barcelona
 
Internal Investigations issue 53
Internal Investigations issue 53Internal Investigations issue 53
Internal Investigations issue 53
Kendall Clark
 
Soddisfazione Alunni Classi Finali Corretto
Soddisfazione Alunni Classi Finali CorrettoSoddisfazione Alunni Classi Finali Corretto
Soddisfazione Alunni Classi Finali Corretto
facc8
 
Cronica diablos redbulls
Cronica diablos redbullsCronica diablos redbulls
Cronica diablos redbulls
Miguel Barrio
 
Clipping Eben 01/01/12 @ IED Barcelona
Clipping Eben 01/01/12 @ IED BarcelonaClipping Eben 01/01/12 @ IED Barcelona
Clipping Eben 01/01/12 @ IED Barcelona
IED Barcelona
 
Esquema+oración+compuesta
Esquema+oración+compuestaEsquema+oración+compuesta
Esquema+oración+compuesta
moteros153
 
mitchell jaques resume 2016
mitchell jaques resume 2016mitchell jaques resume 2016
mitchell jaques resume 2016
Mitchell Jaques
 
Clipping On Diseño 01/12/11 @ IED Barcelona
Clipping On Diseño 01/12/11 @ IED BarcelonaClipping On Diseño 01/12/11 @ IED Barcelona
Clipping On Diseño 01/12/11 @ IED Barcelona
IED Barcelona
 
ADVANCE_NewsletterSpring2016
ADVANCE_NewsletterSpring2016ADVANCE_NewsletterSpring2016
ADVANCE_NewsletterSpring2016
Lisa Robertson
 

Viewers also liked (18)

2 historia de los juegos olímpicos modernos
2 historia de los juegos olímpicos modernos2 historia de los juegos olímpicos modernos
2 historia de los juegos olímpicos modernos
 
Dotnet secure communication based on ambient audio
Dotnet  secure communication based on ambient audioDotnet  secure communication based on ambient audio
Dotnet secure communication based on ambient audio
 
Dotnet region-based foldings in process discovery
Dotnet  region-based foldings in process discoveryDotnet  region-based foldings in process discovery
Dotnet region-based foldings in process discovery
 
Dotnet security analysis of a single sign-on mechanism for distributed compu...
Dotnet  security analysis of a single sign-on mechanism for distributed compu...Dotnet  security analysis of a single sign-on mechanism for distributed compu...
Dotnet security analysis of a single sign-on mechanism for distributed compu...
 
Presentación Cursos
Presentación CursosPresentación Cursos
Presentación Cursos
 
Clipping YoDona 30/12/11 @ IED Barcelona
Clipping YoDona 30/12/11 @ IED BarcelonaClipping YoDona 30/12/11 @ IED Barcelona
Clipping YoDona 30/12/11 @ IED Barcelona
 
Internal Investigations issue 53
Internal Investigations issue 53Internal Investigations issue 53
Internal Investigations issue 53
 
Soddisfazione Alunni Classi Finali Corretto
Soddisfazione Alunni Classi Finali CorrettoSoddisfazione Alunni Classi Finali Corretto
Soddisfazione Alunni Classi Finali Corretto
 
Niño
NiñoNiño
Niño
 
Cronica diablos redbulls
Cronica diablos redbullsCronica diablos redbulls
Cronica diablos redbulls
 
Clipping Eben 01/01/12 @ IED Barcelona
Clipping Eben 01/01/12 @ IED BarcelonaClipping Eben 01/01/12 @ IED Barcelona
Clipping Eben 01/01/12 @ IED Barcelona
 
Esquema+oración+compuesta
Esquema+oración+compuestaEsquema+oración+compuesta
Esquema+oración+compuesta
 
mitchell jaques resume 2016
mitchell jaques resume 2016mitchell jaques resume 2016
mitchell jaques resume 2016
 
Clipping On Diseño 01/12/11 @ IED Barcelona
Clipping On Diseño 01/12/11 @ IED BarcelonaClipping On Diseño 01/12/11 @ IED Barcelona
Clipping On Diseño 01/12/11 @ IED Barcelona
 
N4
N4N4
N4
 
¿Quien soy ?
¿Quien soy ?¿Quien soy ?
¿Quien soy ?
 
ADVANCE_NewsletterSpring2016
ADVANCE_NewsletterSpring2016ADVANCE_NewsletterSpring2016
ADVANCE_NewsletterSpring2016
 
2012
20122012
2012
 

Similar to Dotnet scalable and secure sharing of personal health records in cloud computing using attribute-based encryption

Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
ecway
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
Ecway Technologies
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
ecway
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
ecwayerode
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
ecwayerode
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
ecway
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
Ecway Technologies
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
dbpublications
 

Similar to Dotnet scalable and secure sharing of personal health records in cloud computing using attribute-based encryption (20)

Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
7
77
7
 
Scalable and secure of personal health records in cloud computing using attri...
Scalable and secure of personal health records in cloud computing using attri...Scalable and secure of personal health records in cloud computing using attri...
Scalable and secure of personal health records in cloud computing using attri...
 
Full paper
Full paperFull paper
Full paper
 
Full paper
Full paperFull paper
Full paper
 
Full paper
Full paperFull paper
Full paper
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
 

Dotnet scalable and secure sharing of personal health records in cloud computing using attribute-based encryption

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION ABSTRACT: Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving finegrained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme.