SlideShare a Scribd company logo
1 of 8
Download to read offline
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
925
All Rights Reserved © 2013 IJARCET

Abstract— Cloud computing has emerged as one of the most
influential paradigms in the IT industry for last few years.
Normally data owners and service providers are not in the same
trusted domain in cloud computing. Personal health record
(PHR) is an emerging patient-centric model of health
information exchange, which is often outsourced to be stored at
a third party, such as cloud providers, however the information
could be exposed to those third party servers and to
unauthorized parties. In the existing system, a novel
patient-centric framework and a suite of mechanisms for data
access control to PHRs stored in semi-trusted servers. To
achieve fine-grained and scalable data access control for PHRs,
leverage attribute based encryption (ABE) techniques to
encrypt each patient’s PHR file. A high degree of patient
privacy is guaranteed simultaneously by exploiting
multi-authority ABE. In proposed System, introduce the
concept of Distributed Attribute-Based Encryption (DABE),
where an arbitrary number of parties can be present to maintain
attributes and their corresponding secret keys. Also two-level
access control model introduced, that combines fine-grained
access control, which supports the precise granularity for access
rules, and coarse-grained access control, which allows the
storage provider to manage access requests while learning only
limited information from its inputs. This is achieved by
arranging outsourced resources into units called access blocks
and enforcing access control at the cloud only at the granularity
of blocks.
Index Terms— Attribute Based Encryption, Distributed
Attributed Based Encryption, PHR, Cloud Computing, Coarse
Grain
INTRODUCTION
Cloud computing is a computing model, where
resources such as computing power, storage, network and
software are abstracted and provided as services on the
internet. These services are broadly divided into three
categories : Infrastructure-as-a-Service(Iaas),
Platform-as-a-Service(PaaS), Software-as-a-Service
(SaaS). Cloud computing provides on-demand self
Manuscript received Mar, 2013.
Mr.T.Parameswaran, Assistant Professor, Department of Computer
Science and Engineering, Anna University, Regional Centre- Coimbatore,
India.
Ms.S.Vanitha, Lecturer, Department of Computer Science and
Engineering, Dr.N.G.P Institute of Technology. Coimbatore, India.
Mr.K.S.Arvind, Assistant Professor, Department of Computer Science
and Engineering, Kalaigar Karunanithi Institute of Technology.
Coimbatore, India.
service, in which the different business units are allowed
to get the computing resources as they need without
having to go through IT for equipment .It supports broad
network access, which allows applications to be built in
ways that align with how businesses operate today in
mobile, multi-device, etc. It allows resource pooling,
which allows for pooling of different computing resources
to deliver the services to multiple users. It is highly elastic,
which allows for quick scalability of resources depending
on the demand.
In recent years, personal health record (PHR) has
emerged as a patient-centric model of health information
exchange. In the existing system they propose a novel
ABE-based framework for patient-centric secure sharing
of PHRs in cloud computing environments, under the
multi-owner settings. To address the key management
challenges, they conceptually divide the users in the
system into two types of domains, namely public and
personal domains. In the public domain, they use
multi-authority ABE (MA-ABE) to improve the security
and avoid key escrow problem. Each attribute authority
(AA) in it governs a disjoint subset of user role attributes,
while none of them alone is able to control the security of
the whole system. They propose mechanisms for key
distribution and encryption so that PHR owners can
specify personalized fine-grained role-based access
policies during file encryption. But it has some security
issues. In our proposed system we introduce a two-level
access control model that combines fine-grained access
control, which supports the precise granularity for access
rules, and coarse-grained access control, which allows the
storage provider to manage access requests while learning
only limited information from its inputs. This is achieved
by arranging outsourced resources into units called access
blocks and enforcing access control at the cloud only at
the granularity of blocks. And also our solution handles
the read and writes access control. In recent years,
personal health record (PHR) has emerged as a
patient-centric model of health information exchange. In
the existing system they propose a novel ABE-based
framework for patient-centric secure sharing of PHRs in
cloud computing environments, under the multi-owner
settings. To address the key management challenges, they
conceptually divide the users in the system into two types
of domains, namely public and personal domains. In the
public domain, they use multi-authority ABE (MA-ABE)
to improve the security and avoid key escrow problem.
An Efficient Sharing of Personal Health
Records Using DABE in Secure Cloud
Environment
T .Parameswaran, S.Vanitha, K.S.Arvind
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
926
Each attribute authority (AA) in it governs a disjoint
subset of user role attributes, while none of them alone is
able to control the security of the whole system. The
mechanisms for key distribution and encryption so that
PHR owners can specify personalized fine-grained
role-based access policies during file encryption. But it
has some security issues. It introduced a two-level access
control model that combines fine-grained access control,
which supports the precise granularity for access rules,
and coarse-grained access control, which allows the
storage provider to manage access requests while learning
only limited information from its inputs. This is achieved
by arranging outsourced resources into units called access
blocks and enforcing access control at the cloud only at
the granularity of blocks. And also our solution handles
the read and writes access control.
II. LITERATURE REVIEW
A. Personal Health Record Using ABE
Personal Health Record (PHR) is an emerging
patient-centric model of health information exchange,
which is often outsourced to be stored at a third party, such
as cloud providers. However, there have been wide
privacy concerns as personal health information could be
exposed to those third party servers and to unauthorized
parties. To assure the patients’ control over access to their
own PHRs, it is a promising method to encrypt the PHRs
before outsourcing. Yet, issues such as risks of privacy
exposure, scalability in key management, flexible access
and efficient user revocation, have remained the most
important challenges toward achieving fine-grained,
cryptographically enforced data access control. Ming Li,
Shucheng Yu , Yao Zheng and Kui Ren [1] propose a
novel patient-centric framework and a suite of
mechanisms for data access control to PHRs stored in
semi-trusted servers. To achieve fine-grained and scalable
data access control for PHRs, and leverage attribute based
encryption (ABE) techniques to encrypt each patient’s
PHR file. Different from previous works in secure data
outsourcing, it focus on the multiple data owner scenario,
and divide the users in the PHR system into multiple
security domains that greatly reduces the key management
complexity for owners and users. A high degree of patient
privacy is guaranteed simultaneously by exploiting
multi-authority ABE. This scheme also enables dynamic
modification of access policies or file attributes, supports
efficient on-demand user/attribute revocation and
break-glass access under emergency scenarios.
B. Securing Personal Health Records
M. Li, S. Yu, K. Ren, and W. Lou [14] proposes a novel
and practical framework for fine-grained data access
control to PHR data in cloud computing environments,
under multi owner settings. To ensure that each owner has
full control over her PHR data, they leverage
Attribute-Based Encryption (ABE) as the encryption
primitive, and each owner generates her own set of ABE
keys. his way, a patient can selectively shaIn tre her PHR
among a set of users by encrypting the file according to a
set of attributes, and her encryption and user management
complexity is linear to the number of attributes rather than
the number of authorized users in the system.
C. Securing Personal Health Records
M. Li, S. Yu, K. Ren, and W. Lou [14] proposes a novel
and practical framework for fine-grained data access
control to PHR data in cloud computing environments,
under multi owner settings. To ensure that each owner has
full control over her PHR data, they leverage
Attribute-Based Encryption (ABE) as the encryption
primitive, and each owner generates her own set of ABE
keys. his way, a patient can selectively shaIn tre her PHR
among a set of users by encrypting the file according to a
set of attributes, and her encryption and user management
complexity is linear to the number of attributes rather than
the number of authorized users in the system. To avoid
from high key management complexity for each owner
and user, they divide the system into multiple Security
Domains (SDs), where each of them is associated with a
subset of all the users. Each owner and the users having
personal connections to her belong to a personal domain,
while for each public domain they rely on multiple
auxiliary Attribute Authorities (AA) to manage its users
and attributes. Each AA distributive governs a disjoint
subset of attributes, while none of them alone is able to
control the security of the whole system. In addition, they
discuss methods for enabling efficient and on-demand
revocation of users or attributes, and break-glass access
under emergence scenarios.
D. Securing The E-Health Cloud
H. Lohr, A.-R. Sadeghi, and M. Winandy [4] proposes
general problems of e-health systems and provide a
technical solution for the protection of privacy-sensitive
data, which has not been appropriately addressed yet for
end-user systems. In particular, Their contributions are as
follows: They describe an abstract model of e-health
clouds, which comprehends the common entities of
healthcare telemetric infrastructures. Based on this model,
they outline three main problem areas for security and
privacy, namely (i) data storage and processing, (ii)
management of e-health infrastructures, and (iii) usability
aspects of end-users. They present security architecture
for privacy domains in e-health systems which leverages
on modern security technology of commodity platforms.
This architecture extends the protection of
privacy-sensitive data from centrally managed secure
networks to the client platforms of the end-users. For each
application area a separate privacy domain is established
and it is enforced both centrally and locally on each
platform.
E. Authorized Private Keyword Search
M. Li, S. Yu, N. Cao, and W. Lou [15] proposes the
systematic study the problem of authorized private
keyword searches (APKS) over encrypted PHRs in cloud
computing. They make the following main contributions.
First, they propose a fine-grained authorization
framework in which every user obtain search capabilities
under the authorization of local trusted 11
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
927
All Rights Reserved © 2013 IJARCET
Authorities (LTAs), based on checking for user’s
attributes. The central TA’s task is reduced to minimum,
and can remain semi-offline after initialization. Using an
obtained capability, a user can let the cloud server search
through all owners’ encrypted PHRs to find the records
that match with the query conditions. Their framework
enjoys a high level of system scalability for PHR
applications in the public domain. To realize such a
framework, they make novel use of a recent cryptographic
primitive, hierarchical predicate encryption (HPE), which
features delegation of search capabilities. Based on HPE
they propose two solutions for searching on encrypted
PHR documents, APKS and APKS+. The first solution
enhances search efficiency, especially for subset and a
class of simple range queries, while the second enhances
query privacy with the help of proxy servers. Both
schemes support multi-dimensional multi-keyword
searches and allow delegation and revocation of search
capabilities. Finally, they implement their scheme on a
modern workstation and carry out extensive performance
evaluation. Through experimental results they
demonstrate that their scheme is suitable for a wide range
of delay-tolerant PHR applications. To the best of their
knowledge, their work is the first to address the authorized
private search over encrypted PHRs within the public
domain.
F. Privacy of Electronic Medical Records
J. Benaloh, m. Chase, e. Horvitz, and k. Lauter [5]
proposes the encryption schemes with strong security
properties will guarantee that the patient's privacy is
protected. However, adherence to a simple encryption
scheme can interfere with the desired functionality of
health record systems. In particular, they would like to
employ encryption, yet support such desirable functions
as allowing users to share partial access rights with others
and to perform various searches over their records. In
what follows, they consider encryption schemes that
enable patients to delegate partial decryption rights, and
that allow patients (and their delegates) to search over
their health data. They shall propose a design that refers to
as Patient Controlled Encryption (PCE) as a solution to
secure and private storage of patients' medical records.
PCE allows the patient to selectively share records among
doctors and healthcare providers. The design of the
system is based on a hierarchical encryption system. The
patient's record is partitioned into a hierarchical structure,
each portion of which is encrypted with a corresponding
key. The patient is required to store a root secret key, from
which a tree of sub keys is derived. The patient can
selectively distribute sub keys for decryption of various
portions of the record. The patient can also generate and
distribute trapdoors for selectively searching portions of
the record. Their design prevents unauthorized access to
patients' medical data by data storage providers,
healthcare providers, pharmaceutical companies,
insurance companies, or others who have not been given
the appropriate decryption keys.prevents unauthorized
access to patients' medical data by data storage providers,
healthcare providers, pharmaceutical companies,
insurance companies, or others who have not been given
the appropriate decryption keys.
G. Achieving secure, scalable, and fine-grained data access
control in cloud computing
Cloud computing is an emerging computing paradigm
in which resources of the computing infrastructure are
provided as services over the Internet. As promising as it
is, this paradigm also brings forth many new challenges
for data security and access control when users outsource
sensitive data for sharing on cloud servers, which are not
within the same trusted domain as data owners. To keep
sensitive user data confidential against untrusted servers,
existing solutions usually apply cryptographic methods by
disclosing data decryption keys only to authorized users.
However, in doing so, these solutions inevitably introduce
a heavy computation overhead on the data owner for key
distribution and data management when fine-grained data
access control is desired, and thus do not scale well. The
problem of simultaneously achieving fine-grainedness,
scalability, and data confidentiality of access control
actually still remains unresolved. S. Yu, C. Wang, K. Ren,
and W. Lou addresses this challenging open issue by, on
one hand, defining and enforcing access policies based on
data attributes, and, on the other hand, allowing the data
owner to delegate most of the computation tasks involved
in fine-grained data access control to untrusted cloud
servers without disclosing the underlying data contents.
They achieve this goal by exploiting and uniquely
combining techniques of attribute-based encryption
(ABE), proxy re-encryption, and lazy re-encryption. Our
proposed scheme also has salient properties of user access
privilege confidentiality and user secret key
accountability. Extensive analysis shows that our
proposed scheme is highly efficient and provably secures
under existing security models.
II. EXISTING SYSTEM
In the existing system our framework is to provide
secure patient-centric PHR access and efficient key
management at the same time. The key idea is to divide the
system into multiple security domains (namely, public
domains (PUDs) and personal domains (PSDs))
according to the different users’ data access requirements.
The PUDs consist of users who make access based on
their professional roles, such as doctors, nurses and
medical researchers. In practice, a PUD can be mapped to
an independent sector in the society, such as the health
care, government or insurance sector. For each PSD, its
users are personally associated with a data owner (such as
family members or close friends), and they make accesses
to PHRs based on access rights assigned by the owner. In
both types of security domains, we utilize ABE to realize
cryptographically enforced, patient-centric PHR access.
Especially, in a PUD multi-authority ABE is used, in
which there are multiple “attribute authorities” (AAs),
each governing a disjoint subset of attributes. Role
attributes are defined for PUDs, representing the
professional role or obligations of a PUD user. Users in
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
928
PUDs obtain their attribute-based secret keys from the
AAs, without directly interacting with the owners.
Fig: 1. Framework for patient centric, PHR sharing on semi
Trusted storage
To control access from PUD users, owners are free to
specify role-based fine-grained access policies for her
PHR files, while do not need to know the list of authorized
users when doing encryption. Since the PUDs contain the
majority of users, it greatly reduces the key management
overhead for both the owners and users. Each data owner
(e.g., patient) is a trusted authority of her own PSD, who
uses a KP-ABE system to manage the secret keys and
access rights of users in her PSD. Since the users are
personally known by the PHR owner, to realize
patient-centric access, the owner is at the best position to
grant user access privileges on a case-by-case basis. For
PSD, data attributes are defined which refer to the
intrinsic properties of the PHR data, such as the category
of a PHR file. For the purpose of PSD access, each PHR
file is labeled with its data attributes, while the key size is
only linear with the number of file categories a user can
access. Since the number of users in a PSD is often small,
it reduces the burden for the owner. When encrypting the
data for PSD, all that the owner needs to know is the
intrinsic data properties. The multi-domain approach best
models different user types and access requirements in a
PHR system. The use of ABE makes the encrypted PHRs
self-protective, i.e., they can be accessed by only authorized
users even when storing on a semi-trusted server, and when the
owner is not online. In addition, efficient and on-demand user
revocation is made possible via our ABE enhancements.
Drawbacks of Existing System
 The expressibility of our existing encryptor’s access
policy is somewhat limited by that of MA-ABE’s,
since it only supports conjunctive policy across
multiple AAs.
 The credentials from different organizations may be
considered equally effective, in that case
distributed ABE schemes will be needed. We
designate those issues as proposed works
III. PROPOSED SYSTEM
In this proposed system we introduce the concept of
Distributed Attribute-Based Encryption (DABE), i.e., a
fully distributed version of CP-ABE, where multiple
attribute authorities may be present and distribute secret
attribute keys. Furthermore, we give the first construction
of a DABE scheme, which supports policies written in
DNF; the cipher texts grow linearly with the number of
conjunctive terms in the policy. Our scheme is very simple
and efficient, demonstrating the practical viability of
DABE. We furthermore provide a proof of security in the
generic group model; even though this proof is weaker
than the proofs of some more recent CP-ABE schemes,
our scheme is much more efficient, requiring only O(1)
pairing operations during encryption and decryption. The
following diagrams shows that the authority to each users.
The basic idea behind it is to provide two levels of
access control: coarse-grained and fine-grained. The
coarse grained level access control will be enforced
explicitly by the cloud provider and it would also
represent the granularity at which he will learn the access
pattern of users. Even though the cloud provider will learn
the access pattern over all user requests, he will not be
able to distinguish requests from different users, which
would come in the form of anonymous tokens. The
fine-grained access control will be enforced obliviously to
the cloud through encryption and would prevent him from
differentiating requests that result in the same
coarse-grained access control decision but have different
fine-grained access pattern. The mapping between files
and access blocks is transparent to the users in the sense
that they can submit file requests without knowing in what
blocks the files are contained. While most existing
solutions focus on read request, we present a solution that
provides both read and write access control. Choosing the
granularity for the access blocks in the read and write
access control schemes affects the privacy guarantees for
the scheme as well as its efficiency performance.
Advantages of Proposed System
 It provides data confidentiality by implementing a
fine-grained and coarse grained cryptographic
access control mechanism;
 It supports practical and flexible data sharing
scheme by handling both read and write
operations in the access control model.
 It enhances data and user privacy by protecting
access control rules and access patterns from the
storage provider. It provides data confidentiality
by implementing a fine-grained and coarse
grained cryptographic access control mechanism
 . Benefit from the use of Distributed attribute-based
encryption, there is no central authority that is
able to maintain all attributes and distribute
secret attribute keys.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
929
All Rights Reserved © 2013 IJARCET
 It enhances data and user privacy by protecting
access control rules and access patterns from the
storage provider
Fig: 2. An example policy realizable using MA-ABE
DBAE(Distributed Attribute Based Encryption)
In this section define the concept of DABE and
introduce the required keys and algorithms. The following
table provides a quick reference of the most relevant keys.
Users, Attributes and Keys
During setup, a public master key PK and a secret
master key MK are generated; PK is available to every
party, whereas MK is only known to the master. Every
user u maintains a public user key PKu, which is used by
attribute authorities to generate personalized secret
attribute keys, and a secret key SKu, which is used in the
decryption operation. Generation and distribution of PKu
and SKu is the task of the master, who is also required to
verify the identity of the users before keys are issued. The
keys SKu and PKu of a user u are bound to the identity
and/or pseudonyms of the user by the master. This binding
is crucial for the verification of the user’s attributes. Every
attribute authority maintains a secret key SKa which is
used to issue secret attribute keys to users. An attribute is a
tuple consisting of an identifier of an attribute authority
(e.g. an URL) and an identifier describing the attribute
itself (an arbitrary string). We will denote the public
representation of the attribute as A and use aA as the
identifier of the attribute authority present within A. For
every attribute with representation A there is a public key,
denoted PKA, which is issued by the respective attribute
authority and is used to encrypt messages. The
corresponding secret attribute keys, personalized for
eligible users, are issued by the attribute authorities to
users who request them (after determining their
eligibility). To prevent collusions, every user gets a
different secret attribute key that only he can use. A secret
attribute key of an attribute A, issued for a user u is
denoted by SKA, u. We call the set of secret keys that a user
has (i.e., the key SKu and all keys SK A, u) his key ring.
The DABE Scheme
The DABE scheme consists of seven fundamental
algorithms: Setup, CreateUser, CreateAuthority,
RequestAttributePK, RequestAttributeSK, Encrypt and
Decrypt. The description of the seven algorithms is as
follows:
 Setup: The Setup algorithm takes as input the implicit
security parameter 1k. It outputs the public key PK
and the master key MK.
 CreateUser (PK, MK, u): The CreateUser algorithm
takes as input the public key PK, the master key MK,
and a user name u. It outputs a public user key PKu,
that will be used by attribute authorities to issue
secret attribute keys for u, and a secret user key SKu,
used for the decryption of ciphertexts.
 CreateAuthority (PK, a): The CreateAuthority
algorithm is executed by the attribute authority with
identifier a once during initialization. It outputs a
secret authority key SKa.
RequestAttributePK (PK, A, SKa): The
RequestAttributePK algorithm is executed by attribute
authorities whenever they receive a request for a public
attribute key. The algorithm checks whether the authority
identifier aA of A equals a. If this is the case, the
algorithm outputs a public attribute key for attribute A,
denoted PKA, otherwise NULL.
 RequestAttributeSK (PK, A, SKa, u, PKu):
The RequestAttributeSK algorithm is executed by
the attribute authority with identifier a whenever it
receives a request for a secret attribute key. The
algorithm checks whether the authority identifier
aA of A equals a and whether the user u with public
key PKu is eligible of the attribute A. If this is the
case, RequestAttributeSK outputs a secret attribute
key SKA,u for user u. Otherwise, the algorithm
outputs NULL.
 Encrypt (PK,M,A,PKA1, . . . ,PKAN ): The
Encrypt algorithm takes as input the public key
PK, a message M, an access policy A and the
public keys PKA1, . . . ,PKAN corresponding to all
attributes occurring in the policy A. The algorithm
encrypts M with A and outputs the ciphertext CT.
 Decrypt(PK,CT,A, SKu, SKA1,u, . . . , SKAN,u
): The Decrypt algorithm takes as input a ciphertext
produced by the Encrypt algorithm, an access policy
A, under which CT was encrypted, and a key ring SKu,
SKA1,u, . . . , SKAN,u for user u. The algorithm
Decrypt decrypts the ciphertext CT and outputs the
corresponding plaintext M if the attributes were
sufficient to satisfy A; otherwise it outputs NULL.
Note that this scheme differs from CP-ABE] in that the
two algorithms CreateAuthority and RequestAttributePK
were added, and CP-ABE’s algorithm KeyGen is split up
into CreateUser and RequestAttributeSK. It is crucial that
RequestAttributeSK does not need any components of the
master key MK as input, so that every attribute authority is
able to independently create attributes. However, we still
require that a trusted central party maintains users
(executes CreateUser), as otherwise collusion attacks
would be possible.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
930
TABLE I. KEY DESCRIPTION OF HEALTH CARE DOMAIN
Key Description Usage
PK Global Key Input for all operation
MK Master Key Creation of user keys
SKa Secret Key of Attribute
authority a
Creation of attribute
key
PKa Public key of attribute a Encryption
SKu Secret key of attribute a for
user u
Decryption
PKu Public key of user u Key request
SKa,u Secret key of user u Decryption
Security Model
Setup : The challenger runs the Setup algorithm and
gives the global key PK to the adversary.
 The challenger runs the Setup algorithm and gives
the global key PK to the adversary.
 The adversary asks the challenger for an arbitrary
number of user keys. The challenger calls CreateUser
for each requested user and returns the resulting public
and private user keys to the adversary. For each user
the adversary can request an arbitrary number of secret
and public attribute keys, that the challenger creates by
calling RequestAttributeSK or Request AttributePK,
respectively. Whenever the challenger receives a
request for an attribute A of authority a, he tests
whether he has already created a secret key SKa for a.
If not, he first calls CreateAuthority to create the
appropriate authority key (note that SKa will not be
made available to the adversary).
Challenge : The adversary submits two messages M0
and M1 and an access policy A such that none of the users
that he created in Phase 1 satisfy A. (If any user from
Phase 1 satisfies A, the challenger aborts.) As before, the
challenger may have to call CreateAuthority to initialize
attribute authorities. The challenger flips a coin b,
encrypts Mb under A, and gives the ciphertext CT to the
adversary.
 The adversary may create an arbitrary number of
users. He can also request more secret attribute keys
for the users he created in Phase 1 and 2, but if any
secret attribute key would give the respective user a set
of attributes needed to satisfy A, the challenger aborts.
As before, the adversary can always request any public
attribute key.
Guess: The adversary outputs a guess b’ of b.
The advantage of the adversary in this game is
defined as , where the probability is taken over
all coin tosses of both challenger and adversary. A DABE
scheme is secure if all polynomial time adversaries have at
most a negligible advantage in the above game.
Two level access control
In this a hybrid solution suggest that offers a way to
trade off privacy and efficiency guarantees. The basic idea
behind it is to provide two levels of access control:
coarse-grained and fine-grained. The coarse grained level
access control will be enforced explicitly by the cloud
provider and it would also represent the granularity at
which he will learn the access pattern of users. Even
though the cloud provider will learn the access pattern
over all user requests, he will not be able to distinguish
requests from different users, which would come in the
form of anonymous tokens. The fine-grained access
control will be enforced obliviously to the cloud through
encryption and would prevent him from differentiating
requests that result in the same coarse-grained access
control decision but have different fine-grained access
pattern. The mapping between files and access blocks is
transparent to the users in the sense that they can submit
file requests without knowing in what blocks the files are
contained. While most existing solutions focus on read
request, we present a solution that provides both read and
write access control. Choosing the granularity for the
access blocks in the read and write access control schemes
affects the privacy guarantees for the scheme as well as its
efficiency performance.
IV. CONCLUSION
In this paper, we have proposed a novel framework of
secure sharing of personal health records in cloud
computing by using DABE. Considering partially
trustworthy cloud servers, argue that to fully realize the
patient-centric concept, patients shall have complete
control of their own privacy through encrypting their PHR
files to allow fine-grained access. The framework
addresses the unique challenges brought by multiple PHR
owners and users, in that greatly reduce the complexity of
key management while enhance the privacy guarantees
compared with previous works. We utilize ABE to
encrypt the PHR data, so that the patients can allow access
not only by personal users, but also various users from
public domains with different professional roles,
qualifications and affiliations. Further enhancement could
be done on an existing DABE scheme to handle efficient
and on-demand user revocation, and prove its security.
REFERENCES
[1] M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records
in cloud computing: Patient-centric and fine-grained data access
control in multi-owner settings,” in SecureComm’10, Sept. 2010, pp.
89–106.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
931
All Rights Reserved © 2013 IJARCET
[2] H. L¨ohr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health
cloud,” in Proceedings of the 1st ACM International Health
Informatics Symposium, ser. IHI ’10, 2010, pp. 220–229.
[3] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword
search over encrypted personal health records in cloud computing,” in
ICDCS ’11, Jun. 2011
[4] “The health insurance portability and accountability act.” [Online].
Available: http://www.cms.hhs.gov/HIPAAGenInfo/01
Overview.asp
[5] “Google, microsoft say hipaa stimulus rule doesn’t apply to them,”
http://www.ihealthbeat.org/Articles/2009/4/8/.
[6] “At risk of exposure – in the push for electronic medical records,
concern is growing about how well privacy can be safeguarded,” 2006.
[Online].
Available:http://articles.latimes.com/2006/jun/26/health/he-privacy26
[7] K. D. Mandl, P. Szolovits, and I. S. Kohane, “Public standards and
patients’ control: how to keep electronic medical records accessible but
private,” BMJ, vol. 322, no. 7281, p. 283, Feb. 2001.
[8] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled
encryption: ensuring privacy of electronic medical records,” in CCSW
’09, 2009, pp. 103–114.
[9] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and
fine-grained data access control in cloud computing,” in IEEE
INFOCOM’10, 2010.
[10] C. Dong, G. Russello, and N. Dulay, “Shared and searchable encrypted
data for untrusted servers,” in Journal of Computer Security, 2010.
[11] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based
encryption for fine-grained access control of encrypted data,” in CCS
’06, 2006, pp. 89–98.
[12] M. Li, W. Lou, and K. Ren, “Data security and privacy in wireless
body area networks,” IEEEWireless Communications Magazine, Feb.
2010.
[13] A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption
with efficient revocation,” in ACM CCS, ser. CCS ’08, 2008,
pp.417–426.
[14] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker,
“Ciphertext-policy attribute-based threshold decryption with flexible
delegation and revocation of user attributes,” 2009.
[15] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing
with attribute revocation,” in ASIACCS’10, 2010.
[16] S. Narayan, M. Gagn´e, and R. Safavi-Naini, “Privacy preserving
system using attribute-based infrastructure,” ser. CCSW ’10,2010, pp.
47–52.
[17] X. Liang, R. Lu, X. Lin, and X. S. Shen, “Patient self-controllable
access policy on phi in ehealthcare systems,” in AHIC 2010, 2010.
[18] L. Ibraimi, M. Asim, and M. Petkovic, “Secure management of
personal health records by applying attribute-based encryption,”
Technical Report, University of Twente, 2009.
[19] J.Bethencourt,A.Sahai, and B. Waters,
“Ciphertext-policyattribute-based encryption,” in IEEE S& P ’07,
2007, pp. 321–334.
[20] J. A. Akinyele, C. U. Lehmann, M. D. Green, M. W. Pagano, Z. N. J.
Peterson, and A. D. Rubin, “Self-protecting electronic medical records
using attribute-based encryption,” Cryptology
ePrint Archive, Report 2010/565, 2010, http://eprint.iacr.org/.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
932
S.Vanitha has received her B.E degree in Computer Science and
Engineering from Vivekanandha college of Engineering for women in 2005.
She is pursing part time M.E degree in Software Engineering from Anna
University, Regional centre-Coimbatore. She is currently working as
Lecturer in the Department of Computer Science and Engineering, Dr.N.G.P
Institute of Technology, Coimbatore, India. She is the lifelong member of
ISTE.
K.S.Arvind has received his B.Tech degree in Computer Science and
Engineering from Rajiv Gandhi College of Engineering and Technology in
2006, and M.E degree in Computer Science and Engineering from Dr Pauls
Engineering College,Villupuram in 2010. He is currently pursuing his Ph.D
from Anna University, Chennai.
Parameswaran.T has received his B.E degree in Electronics and
Communication Engineering from Velalar College of Engineering and
Technology, Erode, and M.E degree in Software Engineering from College
of Engineering Gindy, Anna University Chennai in 2005 and 2008
respectively. He is currently pursuing his Ph.D from Anna University,
Regional Centre-Coimbatore. He is currently working as Assistant
professor in the Department of Computer Science and Engineering,, Anna
University, Regional Centre-Coimbatore, TamilNadu, India. He is a student
member of IEEE.

More Related Content

What's hot

FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETSFAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETScsandit
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...IRJET Journal
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storagesarfraznawaz
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilityNandini Chandran
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
 
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENT
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENTATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENT
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENThiij
 
Attribute Based Access Control (ABAC) for EHR in Fog Computing Environment
Attribute Based Access Control (ABAC) for EHR in Fog Computing EnvironmentAttribute Based Access Control (ABAC) for EHR in Fog Computing Environment
Attribute Based Access Control (ABAC) for EHR in Fog Computing Environmentneirew J
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...IJSRED
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...Ulf Mattsson
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...IJCERT JOURNAL
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsSwathi Rampur
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...CloudTechnologies
 
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health RecordsCloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
 

What's hot (19)

FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETSFAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storage
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
2nd rvw
2nd rvw2nd rvw
2nd rvw
 
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENT
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENTATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENT
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENT
 
Attribute Based Access Control (ABAC) for EHR in Fog Computing Environment
Attribute Based Access Control (ABAC) for EHR in Fog Computing EnvironmentAttribute Based Access Control (ABAC) for EHR in Fog Computing Environment
Attribute Based Access Control (ABAC) for EHR in Fog Computing Environment
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare...
 
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health RecordsCloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Records
 

Viewers also liked

Daily mcx newsletter 13 aug 2013
Daily mcx newsletter 13 aug 2013Daily mcx newsletter 13 aug 2013
Daily mcx newsletter 13 aug 2013Richa Sharma
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Garrido Miguel A.- Qué es la literatura
Garrido Miguel A.- Qué es la literaturaGarrido Miguel A.- Qué es la literatura
Garrido Miguel A.- Qué es la literaturaMelomania
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Business Research Project- Company Y week 6 a
Business Research Project- Company Y week 6 aBusiness Research Project- Company Y week 6 a
Business Research Project- Company Y week 6 aMoniquie Huzzie
 
Ijarcet vol-2-issue-7-2262-2267
Ijarcet vol-2-issue-7-2262-2267Ijarcet vol-2-issue-7-2262-2267
Ijarcet vol-2-issue-7-2262-2267Editor IJARCET
 
Smart plant applications Used in industries
Smart plant applications Used in industriesSmart plant applications Used in industries
Smart plant applications Used in industriesraghunathan janarthanan
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Bìa Diễn đàn Văn nghệ Việt Nam - Số 5/2013
Bìa Diễn đàn Văn nghệ Việt Nam - Số 5/2013Bìa Diễn đàn Văn nghệ Việt Nam - Số 5/2013
Bìa Diễn đàn Văn nghệ Việt Nam - Số 5/2013longvanhien
 
Volume 2-issue-6-2085-2090
Volume 2-issue-6-2085-2090Volume 2-issue-6-2085-2090
Volume 2-issue-6-2085-2090Editor IJARCET
 

Viewers also liked (20)

1776 1779
1776 17791776 1779
1776 1779
 
Daily mcx newsletter 13 aug 2013
Daily mcx newsletter 13 aug 2013Daily mcx newsletter 13 aug 2013
Daily mcx newsletter 13 aug 2013
 
1820 1824
1820 18241820 1824
1820 1824
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Garrido Miguel A.- Qué es la literatura
Garrido Miguel A.- Qué es la literaturaGarrido Miguel A.- Qué es la literatura
Garrido Miguel A.- Qué es la literatura
 
Elmwood guide to the living trust
Elmwood guide to the living trustElmwood guide to the living trust
Elmwood guide to the living trust
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368
 
1850 1854
1850 18541850 1854
1850 1854
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Business Research Project- Company Y week 6 a
Business Research Project- Company Y week 6 aBusiness Research Project- Company Y week 6 a
Business Research Project- Company Y week 6 a
 
Ijarcet vol-2-issue-7-2262-2267
Ijarcet vol-2-issue-7-2262-2267Ijarcet vol-2-issue-7-2262-2267
Ijarcet vol-2-issue-7-2262-2267
 
1771 1775
1771 17751771 1775
1771 1775
 
Smart plant applications Used in industries
Smart plant applications Used in industriesSmart plant applications Used in industries
Smart plant applications Used in industries
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Bìa Diễn đàn Văn nghệ Việt Nam - Số 5/2013
Bìa Diễn đàn Văn nghệ Việt Nam - Số 5/2013Bìa Diễn đàn Văn nghệ Việt Nam - Số 5/2013
Bìa Diễn đàn Văn nghệ Việt Nam - Số 5/2013
 
1663 1669
1663 16691663 1669
1663 1669
 
Volume 2-issue-6-2085-2090
Volume 2-issue-6-2085-2090Volume 2-issue-6-2085-2090
Volume 2-issue-6-2085-2090
 

Similar to Efficient PHR Sharing in Cloud Using DABE

Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...JPINFOTECH JAYAPRAKASH
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Naveena N
 
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingA Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingIJMER
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...IEEEGLOBALSOFTTECHNOLOGIES
 
Iaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd Iaetsd
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionEditor IJCATR
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal healthShakas Technologies
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based dataASAITHAMBIRAJAA
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...JPINFOTECH JAYAPRAKASH
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingNaveena N
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...JPINFOTECH JAYAPRAKASH
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...dbpublications
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...dbpublications
 
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET Journal
 

Similar to Efficient PHR Sharing in Cloud Using DABE (20)

Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Kg3617691773
Kg3617691773Kg3617691773
Kg3617691773
 
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingA Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud Computing
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
 
Full paper
Full paperFull paper
Full paper
 
Full paper
Full paperFull paper
Full paper
 
Full paper
Full paperFull paper
Full paper
 
Iaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal health
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 
7
77
7
 
7
77
7
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computing
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
 
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Efficient PHR Sharing in Cloud Using DABE

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 925 All Rights Reserved © 2013 IJARCET  Abstract— Cloud computing has emerged as one of the most influential paradigms in the IT industry for last few years. Normally data owners and service providers are not in the same trusted domain in cloud computing. Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers, however the information could be exposed to those third party servers and to unauthorized parties. In the existing system, a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and scalable data access control for PHRs, leverage attribute based encryption (ABE) techniques to encrypt each patient’s PHR file. A high degree of patient privacy is guaranteed simultaneously by exploiting multi-authority ABE. In proposed System, introduce the concept of Distributed Attribute-Based Encryption (DABE), where an arbitrary number of parties can be present to maintain attributes and their corresponding secret keys. Also two-level access control model introduced, that combines fine-grained access control, which supports the precise granularity for access rules, and coarse-grained access control, which allows the storage provider to manage access requests while learning only limited information from its inputs. This is achieved by arranging outsourced resources into units called access blocks and enforcing access control at the cloud only at the granularity of blocks. Index Terms— Attribute Based Encryption, Distributed Attributed Based Encryption, PHR, Cloud Computing, Coarse Grain INTRODUCTION Cloud computing is a computing model, where resources such as computing power, storage, network and software are abstracted and provided as services on the internet. These services are broadly divided into three categories : Infrastructure-as-a-Service(Iaas), Platform-as-a-Service(PaaS), Software-as-a-Service (SaaS). Cloud computing provides on-demand self Manuscript received Mar, 2013. Mr.T.Parameswaran, Assistant Professor, Department of Computer Science and Engineering, Anna University, Regional Centre- Coimbatore, India. Ms.S.Vanitha, Lecturer, Department of Computer Science and Engineering, Dr.N.G.P Institute of Technology. Coimbatore, India. Mr.K.S.Arvind, Assistant Professor, Department of Computer Science and Engineering, Kalaigar Karunanithi Institute of Technology. Coimbatore, India. service, in which the different business units are allowed to get the computing resources as they need without having to go through IT for equipment .It supports broad network access, which allows applications to be built in ways that align with how businesses operate today in mobile, multi-device, etc. It allows resource pooling, which allows for pooling of different computing resources to deliver the services to multiple users. It is highly elastic, which allows for quick scalability of resources depending on the demand. In recent years, personal health record (PHR) has emerged as a patient-centric model of health information exchange. In the existing system they propose a novel ABE-based framework for patient-centric secure sharing of PHRs in cloud computing environments, under the multi-owner settings. To address the key management challenges, they conceptually divide the users in the system into two types of domains, namely public and personal domains. In the public domain, they use multi-authority ABE (MA-ABE) to improve the security and avoid key escrow problem. Each attribute authority (AA) in it governs a disjoint subset of user role attributes, while none of them alone is able to control the security of the whole system. They propose mechanisms for key distribution and encryption so that PHR owners can specify personalized fine-grained role-based access policies during file encryption. But it has some security issues. In our proposed system we introduce a two-level access control model that combines fine-grained access control, which supports the precise granularity for access rules, and coarse-grained access control, which allows the storage provider to manage access requests while learning only limited information from its inputs. This is achieved by arranging outsourced resources into units called access blocks and enforcing access control at the cloud only at the granularity of blocks. And also our solution handles the read and writes access control. In recent years, personal health record (PHR) has emerged as a patient-centric model of health information exchange. In the existing system they propose a novel ABE-based framework for patient-centric secure sharing of PHRs in cloud computing environments, under the multi-owner settings. To address the key management challenges, they conceptually divide the users in the system into two types of domains, namely public and personal domains. In the public domain, they use multi-authority ABE (MA-ABE) to improve the security and avoid key escrow problem. An Efficient Sharing of Personal Health Records Using DABE in Secure Cloud Environment T .Parameswaran, S.Vanitha, K.S.Arvind
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 926 Each attribute authority (AA) in it governs a disjoint subset of user role attributes, while none of them alone is able to control the security of the whole system. The mechanisms for key distribution and encryption so that PHR owners can specify personalized fine-grained role-based access policies during file encryption. But it has some security issues. It introduced a two-level access control model that combines fine-grained access control, which supports the precise granularity for access rules, and coarse-grained access control, which allows the storage provider to manage access requests while learning only limited information from its inputs. This is achieved by arranging outsourced resources into units called access blocks and enforcing access control at the cloud only at the granularity of blocks. And also our solution handles the read and writes access control. II. LITERATURE REVIEW A. Personal Health Record Using ABE Personal Health Record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. Ming Li, Shucheng Yu , Yao Zheng and Kui Ren [1] propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and scalable data access control for PHRs, and leverage attribute based encryption (ABE) techniques to encrypt each patient’s PHR file. Different from previous works in secure data outsourcing, it focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi-authority ABE. This scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. B. Securing Personal Health Records M. Li, S. Yu, K. Ren, and W. Lou [14] proposes a novel and practical framework for fine-grained data access control to PHR data in cloud computing environments, under multi owner settings. To ensure that each owner has full control over her PHR data, they leverage Attribute-Based Encryption (ABE) as the encryption primitive, and each owner generates her own set of ABE keys. his way, a patient can selectively shaIn tre her PHR among a set of users by encrypting the file according to a set of attributes, and her encryption and user management complexity is linear to the number of attributes rather than the number of authorized users in the system. C. Securing Personal Health Records M. Li, S. Yu, K. Ren, and W. Lou [14] proposes a novel and practical framework for fine-grained data access control to PHR data in cloud computing environments, under multi owner settings. To ensure that each owner has full control over her PHR data, they leverage Attribute-Based Encryption (ABE) as the encryption primitive, and each owner generates her own set of ABE keys. his way, a patient can selectively shaIn tre her PHR among a set of users by encrypting the file according to a set of attributes, and her encryption and user management complexity is linear to the number of attributes rather than the number of authorized users in the system. To avoid from high key management complexity for each owner and user, they divide the system into multiple Security Domains (SDs), where each of them is associated with a subset of all the users. Each owner and the users having personal connections to her belong to a personal domain, while for each public domain they rely on multiple auxiliary Attribute Authorities (AA) to manage its users and attributes. Each AA distributive governs a disjoint subset of attributes, while none of them alone is able to control the security of the whole system. In addition, they discuss methods for enabling efficient and on-demand revocation of users or attributes, and break-glass access under emergence scenarios. D. Securing The E-Health Cloud H. Lohr, A.-R. Sadeghi, and M. Winandy [4] proposes general problems of e-health systems and provide a technical solution for the protection of privacy-sensitive data, which has not been appropriately addressed yet for end-user systems. In particular, Their contributions are as follows: They describe an abstract model of e-health clouds, which comprehends the common entities of healthcare telemetric infrastructures. Based on this model, they outline three main problem areas for security and privacy, namely (i) data storage and processing, (ii) management of e-health infrastructures, and (iii) usability aspects of end-users. They present security architecture for privacy domains in e-health systems which leverages on modern security technology of commodity platforms. This architecture extends the protection of privacy-sensitive data from centrally managed secure networks to the client platforms of the end-users. For each application area a separate privacy domain is established and it is enforced both centrally and locally on each platform. E. Authorized Private Keyword Search M. Li, S. Yu, N. Cao, and W. Lou [15] proposes the systematic study the problem of authorized private keyword searches (APKS) over encrypted PHRs in cloud computing. They make the following main contributions. First, they propose a fine-grained authorization framework in which every user obtain search capabilities under the authorization of local trusted 11
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 927 All Rights Reserved © 2013 IJARCET Authorities (LTAs), based on checking for user’s attributes. The central TA’s task is reduced to minimum, and can remain semi-offline after initialization. Using an obtained capability, a user can let the cloud server search through all owners’ encrypted PHRs to find the records that match with the query conditions. Their framework enjoys a high level of system scalability for PHR applications in the public domain. To realize such a framework, they make novel use of a recent cryptographic primitive, hierarchical predicate encryption (HPE), which features delegation of search capabilities. Based on HPE they propose two solutions for searching on encrypted PHR documents, APKS and APKS+. The first solution enhances search efficiency, especially for subset and a class of simple range queries, while the second enhances query privacy with the help of proxy servers. Both schemes support multi-dimensional multi-keyword searches and allow delegation and revocation of search capabilities. Finally, they implement their scheme on a modern workstation and carry out extensive performance evaluation. Through experimental results they demonstrate that their scheme is suitable for a wide range of delay-tolerant PHR applications. To the best of their knowledge, their work is the first to address the authorized private search over encrypted PHRs within the public domain. F. Privacy of Electronic Medical Records J. Benaloh, m. Chase, e. Horvitz, and k. Lauter [5] proposes the encryption schemes with strong security properties will guarantee that the patient's privacy is protected. However, adherence to a simple encryption scheme can interfere with the desired functionality of health record systems. In particular, they would like to employ encryption, yet support such desirable functions as allowing users to share partial access rights with others and to perform various searches over their records. In what follows, they consider encryption schemes that enable patients to delegate partial decryption rights, and that allow patients (and their delegates) to search over their health data. They shall propose a design that refers to as Patient Controlled Encryption (PCE) as a solution to secure and private storage of patients' medical records. PCE allows the patient to selectively share records among doctors and healthcare providers. The design of the system is based on a hierarchical encryption system. The patient's record is partitioned into a hierarchical structure, each portion of which is encrypted with a corresponding key. The patient is required to store a root secret key, from which a tree of sub keys is derived. The patient can selectively distribute sub keys for decryption of various portions of the record. The patient can also generate and distribute trapdoors for selectively searching portions of the record. Their design prevents unauthorized access to patients' medical data by data storage providers, healthcare providers, pharmaceutical companies, insurance companies, or others who have not been given the appropriate decryption keys.prevents unauthorized access to patients' medical data by data storage providers, healthcare providers, pharmaceutical companies, insurance companies, or others who have not been given the appropriate decryption keys. G. Achieving secure, scalable, and fine-grained data access control in cloud computing Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensitive user data confidential against untrusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. However, in doing so, these solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine-grained data access control is desired, and thus do not scale well. The problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control actually still remains unresolved. S. Yu, C. Wang, K. Ren, and W. Lou addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine-grained data access control to untrusted cloud servers without disclosing the underlying data contents. They achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re-encryption. Our proposed scheme also has salient properties of user access privilege confidentiality and user secret key accountability. Extensive analysis shows that our proposed scheme is highly efficient and provably secures under existing security models. II. EXISTING SYSTEM In the existing system our framework is to provide secure patient-centric PHR access and efficient key management at the same time. The key idea is to divide the system into multiple security domains (namely, public domains (PUDs) and personal domains (PSDs)) according to the different users’ data access requirements. The PUDs consist of users who make access based on their professional roles, such as doctors, nurses and medical researchers. In practice, a PUD can be mapped to an independent sector in the society, such as the health care, government or insurance sector. For each PSD, its users are personally associated with a data owner (such as family members or close friends), and they make accesses to PHRs based on access rights assigned by the owner. In both types of security domains, we utilize ABE to realize cryptographically enforced, patient-centric PHR access. Especially, in a PUD multi-authority ABE is used, in which there are multiple “attribute authorities” (AAs), each governing a disjoint subset of attributes. Role attributes are defined for PUDs, representing the professional role or obligations of a PUD user. Users in
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 928 PUDs obtain their attribute-based secret keys from the AAs, without directly interacting with the owners. Fig: 1. Framework for patient centric, PHR sharing on semi Trusted storage To control access from PUD users, owners are free to specify role-based fine-grained access policies for her PHR files, while do not need to know the list of authorized users when doing encryption. Since the PUDs contain the majority of users, it greatly reduces the key management overhead for both the owners and users. Each data owner (e.g., patient) is a trusted authority of her own PSD, who uses a KP-ABE system to manage the secret keys and access rights of users in her PSD. Since the users are personally known by the PHR owner, to realize patient-centric access, the owner is at the best position to grant user access privileges on a case-by-case basis. For PSD, data attributes are defined which refer to the intrinsic properties of the PHR data, such as the category of a PHR file. For the purpose of PSD access, each PHR file is labeled with its data attributes, while the key size is only linear with the number of file categories a user can access. Since the number of users in a PSD is often small, it reduces the burden for the owner. When encrypting the data for PSD, all that the owner needs to know is the intrinsic data properties. The multi-domain approach best models different user types and access requirements in a PHR system. The use of ABE makes the encrypted PHRs self-protective, i.e., they can be accessed by only authorized users even when storing on a semi-trusted server, and when the owner is not online. In addition, efficient and on-demand user revocation is made possible via our ABE enhancements. Drawbacks of Existing System  The expressibility of our existing encryptor’s access policy is somewhat limited by that of MA-ABE’s, since it only supports conjunctive policy across multiple AAs.  The credentials from different organizations may be considered equally effective, in that case distributed ABE schemes will be needed. We designate those issues as proposed works III. PROPOSED SYSTEM In this proposed system we introduce the concept of Distributed Attribute-Based Encryption (DABE), i.e., a fully distributed version of CP-ABE, where multiple attribute authorities may be present and distribute secret attribute keys. Furthermore, we give the first construction of a DABE scheme, which supports policies written in DNF; the cipher texts grow linearly with the number of conjunctive terms in the policy. Our scheme is very simple and efficient, demonstrating the practical viability of DABE. We furthermore provide a proof of security in the generic group model; even though this proof is weaker than the proofs of some more recent CP-ABE schemes, our scheme is much more efficient, requiring only O(1) pairing operations during encryption and decryption. The following diagrams shows that the authority to each users. The basic idea behind it is to provide two levels of access control: coarse-grained and fine-grained. The coarse grained level access control will be enforced explicitly by the cloud provider and it would also represent the granularity at which he will learn the access pattern of users. Even though the cloud provider will learn the access pattern over all user requests, he will not be able to distinguish requests from different users, which would come in the form of anonymous tokens. The fine-grained access control will be enforced obliviously to the cloud through encryption and would prevent him from differentiating requests that result in the same coarse-grained access control decision but have different fine-grained access pattern. The mapping between files and access blocks is transparent to the users in the sense that they can submit file requests without knowing in what blocks the files are contained. While most existing solutions focus on read request, we present a solution that provides both read and write access control. Choosing the granularity for the access blocks in the read and write access control schemes affects the privacy guarantees for the scheme as well as its efficiency performance. Advantages of Proposed System  It provides data confidentiality by implementing a fine-grained and coarse grained cryptographic access control mechanism;  It supports practical and flexible data sharing scheme by handling both read and write operations in the access control model.  It enhances data and user privacy by protecting access control rules and access patterns from the storage provider. It provides data confidentiality by implementing a fine-grained and coarse grained cryptographic access control mechanism  . Benefit from the use of Distributed attribute-based encryption, there is no central authority that is able to maintain all attributes and distribute secret attribute keys.
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 929 All Rights Reserved © 2013 IJARCET  It enhances data and user privacy by protecting access control rules and access patterns from the storage provider Fig: 2. An example policy realizable using MA-ABE DBAE(Distributed Attribute Based Encryption) In this section define the concept of DABE and introduce the required keys and algorithms. The following table provides a quick reference of the most relevant keys. Users, Attributes and Keys During setup, a public master key PK and a secret master key MK are generated; PK is available to every party, whereas MK is only known to the master. Every user u maintains a public user key PKu, which is used by attribute authorities to generate personalized secret attribute keys, and a secret key SKu, which is used in the decryption operation. Generation and distribution of PKu and SKu is the task of the master, who is also required to verify the identity of the users before keys are issued. The keys SKu and PKu of a user u are bound to the identity and/or pseudonyms of the user by the master. This binding is crucial for the verification of the user’s attributes. Every attribute authority maintains a secret key SKa which is used to issue secret attribute keys to users. An attribute is a tuple consisting of an identifier of an attribute authority (e.g. an URL) and an identifier describing the attribute itself (an arbitrary string). We will denote the public representation of the attribute as A and use aA as the identifier of the attribute authority present within A. For every attribute with representation A there is a public key, denoted PKA, which is issued by the respective attribute authority and is used to encrypt messages. The corresponding secret attribute keys, personalized for eligible users, are issued by the attribute authorities to users who request them (after determining their eligibility). To prevent collusions, every user gets a different secret attribute key that only he can use. A secret attribute key of an attribute A, issued for a user u is denoted by SKA, u. We call the set of secret keys that a user has (i.e., the key SKu and all keys SK A, u) his key ring. The DABE Scheme The DABE scheme consists of seven fundamental algorithms: Setup, CreateUser, CreateAuthority, RequestAttributePK, RequestAttributeSK, Encrypt and Decrypt. The description of the seven algorithms is as follows:  Setup: The Setup algorithm takes as input the implicit security parameter 1k. It outputs the public key PK and the master key MK.  CreateUser (PK, MK, u): The CreateUser algorithm takes as input the public key PK, the master key MK, and a user name u. It outputs a public user key PKu, that will be used by attribute authorities to issue secret attribute keys for u, and a secret user key SKu, used for the decryption of ciphertexts.  CreateAuthority (PK, a): The CreateAuthority algorithm is executed by the attribute authority with identifier a once during initialization. It outputs a secret authority key SKa. RequestAttributePK (PK, A, SKa): The RequestAttributePK algorithm is executed by attribute authorities whenever they receive a request for a public attribute key. The algorithm checks whether the authority identifier aA of A equals a. If this is the case, the algorithm outputs a public attribute key for attribute A, denoted PKA, otherwise NULL.  RequestAttributeSK (PK, A, SKa, u, PKu): The RequestAttributeSK algorithm is executed by the attribute authority with identifier a whenever it receives a request for a secret attribute key. The algorithm checks whether the authority identifier aA of A equals a and whether the user u with public key PKu is eligible of the attribute A. If this is the case, RequestAttributeSK outputs a secret attribute key SKA,u for user u. Otherwise, the algorithm outputs NULL.  Encrypt (PK,M,A,PKA1, . . . ,PKAN ): The Encrypt algorithm takes as input the public key PK, a message M, an access policy A and the public keys PKA1, . . . ,PKAN corresponding to all attributes occurring in the policy A. The algorithm encrypts M with A and outputs the ciphertext CT.  Decrypt(PK,CT,A, SKu, SKA1,u, . . . , SKAN,u ): The Decrypt algorithm takes as input a ciphertext produced by the Encrypt algorithm, an access policy A, under which CT was encrypted, and a key ring SKu, SKA1,u, . . . , SKAN,u for user u. The algorithm Decrypt decrypts the ciphertext CT and outputs the corresponding plaintext M if the attributes were sufficient to satisfy A; otherwise it outputs NULL. Note that this scheme differs from CP-ABE] in that the two algorithms CreateAuthority and RequestAttributePK were added, and CP-ABE’s algorithm KeyGen is split up into CreateUser and RequestAttributeSK. It is crucial that RequestAttributeSK does not need any components of the master key MK as input, so that every attribute authority is able to independently create attributes. However, we still require that a trusted central party maintains users (executes CreateUser), as otherwise collusion attacks would be possible.
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 930 TABLE I. KEY DESCRIPTION OF HEALTH CARE DOMAIN Key Description Usage PK Global Key Input for all operation MK Master Key Creation of user keys SKa Secret Key of Attribute authority a Creation of attribute key PKa Public key of attribute a Encryption SKu Secret key of attribute a for user u Decryption PKu Public key of user u Key request SKa,u Secret key of user u Decryption Security Model Setup : The challenger runs the Setup algorithm and gives the global key PK to the adversary.  The challenger runs the Setup algorithm and gives the global key PK to the adversary.  The adversary asks the challenger for an arbitrary number of user keys. The challenger calls CreateUser for each requested user and returns the resulting public and private user keys to the adversary. For each user the adversary can request an arbitrary number of secret and public attribute keys, that the challenger creates by calling RequestAttributeSK or Request AttributePK, respectively. Whenever the challenger receives a request for an attribute A of authority a, he tests whether he has already created a secret key SKa for a. If not, he first calls CreateAuthority to create the appropriate authority key (note that SKa will not be made available to the adversary). Challenge : The adversary submits two messages M0 and M1 and an access policy A such that none of the users that he created in Phase 1 satisfy A. (If any user from Phase 1 satisfies A, the challenger aborts.) As before, the challenger may have to call CreateAuthority to initialize attribute authorities. The challenger flips a coin b, encrypts Mb under A, and gives the ciphertext CT to the adversary.  The adversary may create an arbitrary number of users. He can also request more secret attribute keys for the users he created in Phase 1 and 2, but if any secret attribute key would give the respective user a set of attributes needed to satisfy A, the challenger aborts. As before, the adversary can always request any public attribute key. Guess: The adversary outputs a guess b’ of b. The advantage of the adversary in this game is defined as , where the probability is taken over all coin tosses of both challenger and adversary. A DABE scheme is secure if all polynomial time adversaries have at most a negligible advantage in the above game. Two level access control In this a hybrid solution suggest that offers a way to trade off privacy and efficiency guarantees. The basic idea behind it is to provide two levels of access control: coarse-grained and fine-grained. The coarse grained level access control will be enforced explicitly by the cloud provider and it would also represent the granularity at which he will learn the access pattern of users. Even though the cloud provider will learn the access pattern over all user requests, he will not be able to distinguish requests from different users, which would come in the form of anonymous tokens. The fine-grained access control will be enforced obliviously to the cloud through encryption and would prevent him from differentiating requests that result in the same coarse-grained access control decision but have different fine-grained access pattern. The mapping between files and access blocks is transparent to the users in the sense that they can submit file requests without knowing in what blocks the files are contained. While most existing solutions focus on read request, we present a solution that provides both read and write access control. Choosing the granularity for the access blocks in the read and write access control schemes affects the privacy guarantees for the scheme as well as its efficiency performance. IV. CONCLUSION In this paper, we have proposed a novel framework of secure sharing of personal health records in cloud computing by using DABE. Considering partially trustworthy cloud servers, argue that to fully realize the patient-centric concept, patients shall have complete control of their own privacy through encrypting their PHR files to allow fine-grained access. The framework addresses the unique challenges brought by multiple PHR owners and users, in that greatly reduce the complexity of key management while enhance the privacy guarantees compared with previous works. We utilize ABE to encrypt the PHR data, so that the patients can allow access not only by personal users, but also various users from public domains with different professional roles, qualifications and affiliations. Further enhancement could be done on an existing DABE scheme to handle efficient and on-demand user revocation, and prove its security. REFERENCES [1] M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings,” in SecureComm’10, Sept. 2010, pp. 89–106.
  • 7. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 931 All Rights Reserved © 2013 IJARCET [2] H. L¨ohr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health cloud,” in Proceedings of the 1st ACM International Health Informatics Symposium, ser. IHI ’10, 2010, pp. 220–229. [3] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword search over encrypted personal health records in cloud computing,” in ICDCS ’11, Jun. 2011 [4] “The health insurance portability and accountability act.” [Online]. Available: http://www.cms.hhs.gov/HIPAAGenInfo/01 Overview.asp [5] “Google, microsoft say hipaa stimulus rule doesn’t apply to them,” http://www.ihealthbeat.org/Articles/2009/4/8/. [6] “At risk of exposure – in the push for electronic medical records, concern is growing about how well privacy can be safeguarded,” 2006. [Online]. Available:http://articles.latimes.com/2006/jun/26/health/he-privacy26 [7] K. D. Mandl, P. Szolovits, and I. S. Kohane, “Public standards and patients’ control: how to keep electronic medical records accessible but private,” BMJ, vol. 322, no. 7281, p. 283, Feb. 2001. [8] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled encryption: ensuring privacy of electronic medical records,” in CCSW ’09, 2009, pp. 103–114. [9] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE INFOCOM’10, 2010. [10] C. Dong, G. Russello, and N. Dulay, “Shared and searchable encrypted data for untrusted servers,” in Journal of Computer Security, 2010. [11] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in CCS ’06, 2006, pp. 89–98. [12] M. Li, W. Lou, and K. Ren, “Data security and privacy in wireless body area networks,” IEEEWireless Communications Magazine, Feb. 2010. [13] A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in ACM CCS, ser. CCS ’08, 2008, pp.417–426. [14] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes,” 2009. [15] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in ASIACCS’10, 2010. [16] S. Narayan, M. Gagn´e, and R. Safavi-Naini, “Privacy preserving system using attribute-based infrastructure,” ser. CCSW ’10,2010, pp. 47–52. [17] X. Liang, R. Lu, X. Lin, and X. S. Shen, “Patient self-controllable access policy on phi in ehealthcare systems,” in AHIC 2010, 2010. [18] L. Ibraimi, M. Asim, and M. Petkovic, “Secure management of personal health records by applying attribute-based encryption,” Technical Report, University of Twente, 2009. [19] J.Bethencourt,A.Sahai, and B. Waters, “Ciphertext-policyattribute-based encryption,” in IEEE S& P ’07, 2007, pp. 321–334. [20] J. A. Akinyele, C. U. Lehmann, M. D. Green, M. W. Pagano, Z. N. J. Peterson, and A. D. Rubin, “Self-protecting electronic medical records using attribute-based encryption,” Cryptology ePrint Archive, Report 2010/565, 2010, http://eprint.iacr.org/.
  • 8. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 932 S.Vanitha has received her B.E degree in Computer Science and Engineering from Vivekanandha college of Engineering for women in 2005. She is pursing part time M.E degree in Software Engineering from Anna University, Regional centre-Coimbatore. She is currently working as Lecturer in the Department of Computer Science and Engineering, Dr.N.G.P Institute of Technology, Coimbatore, India. She is the lifelong member of ISTE. K.S.Arvind has received his B.Tech degree in Computer Science and Engineering from Rajiv Gandhi College of Engineering and Technology in 2006, and M.E degree in Computer Science and Engineering from Dr Pauls Engineering College,Villupuram in 2010. He is currently pursuing his Ph.D from Anna University, Chennai. Parameswaran.T has received his B.E degree in Electronics and Communication Engineering from Velalar College of Engineering and Technology, Erode, and M.E degree in Software Engineering from College of Engineering Gindy, Anna University Chennai in 2005 and 2008 respectively. He is currently pursuing his Ph.D from Anna University, Regional Centre-Coimbatore. He is currently working as Assistant professor in the Department of Computer Science and Engineering,, Anna University, Regional Centre-Coimbatore, TamilNadu, India. He is a student member of IEEE.