Submit Search
Upload
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
•
0 likes
•
12 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i6/IRJET-V6I6707.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET Journal
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
Editor IJCATR
Recommended
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET Journal
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
Editor IJCATR
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
Ej24856861
Ej24856861
IJERA Editor
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
B04010610
B04010610
IJMER
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET Journal
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
IJERA Editor
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET Journal
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET Journal
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
IJERA Editor
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
J018145862
J018145862
IOSR Journals
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
IRJET Journal
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
ijtsrd
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
More Related Content
What's hot
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
Ej24856861
Ej24856861
IJERA Editor
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
B04010610
B04010610
IJMER
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET Journal
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
IJERA Editor
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET Journal
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET Journal
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
IJERA Editor
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
J018145862
J018145862
IOSR Journals
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
What's hot
(18)
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Ej24856861
Ej24856861
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
B04010610
B04010610
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
J018145862
J018145862
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Similar to IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
IRJET Journal
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
ijtsrd
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET Journal
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET Journal
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Journals
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Publishing House
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
suherashaik2003
An interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through Blockchain
IRJET Journal
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
IRJET Journal
Similar to IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
(20)
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
An interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through Blockchain
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
NANDHAKUMARA10
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
hamedmustafa094
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
Morshed Ahmed Rahath
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
drmkjayanthikannan
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
MuhammadAsimMuhammad6
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
SCMS School of Architecture
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
BhangaleSonal
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
SCMS School of Architecture
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
KOUSTAV SARKAR
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
NadaHaitham1
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
School management system project Report.pdf
School management system project Report.pdf
Kamal Acharya
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
Recently uploaded
(20)
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
School management system project Report.pdf
School management system project Report.pdf
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3535 Protecting E-Health Record with Data Sharing in Public Cloud Miss. Pansare Kalyani Baban1, Prof-Kurhade N.V2 1,2Sharadchandra Pawar College of Engineering, Dumberwadi, Tal-Junnar, Dist-Pune ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In the recent years, distributed computing grows rapidly. A lot of knowledge square measure transferred and place away in remote open cloud servers that cannot utterly be trusty by shopper especially, a regularly expanding number of endeavors may need to manage their data by the guide of the cloud servers. In any case, when the data re-appropriated in the cloud are unstable, the troubles of security and assurance winds up squeezing for wide game plan of the cloud frameworks. This paper proposes an ensured data sharing intend to ensure the security of data proprietor and the security challenges for information sharing. The security and productivity examination exhibit that the set upend plan is feasible and effective. Finally, we talk about its application in electronic well-being record. Key Words: Attribute-based encryption, Cloud computing, Data sharing, Searchable encryption 1. INTRODUCTION The technique of cloud computing relieves consume of data management, data processing,andcapital useonequipment, programming, and work force systemsofsupport,etc.Public cloud is owned and controlled by public cloud servers(PCS), which cannot be trusted. PCS might steal or get the data information stored by the users. Thus, many different security notions are proposed to ensurethesecurityincloud such as remote data integrity, remote data sharing, etc. Data sharing is one of important applications in cloud computing, especially for enterprise. Usually, an enterprise may authorize some entities to share its remote data under its defined policy. 2. Related work C. Chu,S. Chow, W. Tzeng, J. Zhou, R. Deng, Key-aggregate crypto system for scalabledatasharingincloudstorage," [1] IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp.468-477, Feb. 2014 The private key holder can discharge a steady size total key for adaptable decisions of cipher-text set in distributed storage, however the other encoded records outside the set stay classified. This compact mixture key is handily sent to others or be keep in a {very} revolving credit with very restricted secure storage. We provide formal privacy observation of our schemes within the customary model. We likewise depict other use of our plans. In explicit, our schemes offer the primary public-key patient controlled secret writing for versatile hierarchy that was nevertheless to be notable. Y. Tong, J. Sun, S. Chow, P. Li, Cloud-assisted mobile- access of health data with privacy and audit ability", [2] IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 2, Mar. 2014. To incorporate key administration from pseudorandom variety generator for unlink capacity, a protected compartmentalization technique for privacy protective keyword search that hides each inquiry and access designs supported excess, and incorporate the thought of attribute primarily based coding with threshold language for giving job based access management with audit ability to stop potential misconduct, in each tradition and emergency cases. C. Fan, V.Huang,H.Rung,Arbitrary-state attribute-based encryption with dynamic membership", [3] IEEE Transactions on Computers, vol. 63, no. 8, pp. 1951- 1961, Apr. 2013. An ABE theme that is that the 1st ABE theme that aims at dynamic membership management with arbitrary states, not binary states solely, for each attribute. Our work likewise keeps high adaptability of the limitations on properties and influences clients to have the capacity to powerfully join, leave, and refresh their traits. It is pointless for those clients who don't change their credit statuses to reestablish their private keys when some client updates the values of her/his attributes. Finally, we tend to conjointly formally prove the safety of the planned theme while not victimisation random oracles. D. Boneh, G. Crescenzo, R. Ostrovskyy, G. Persianoz, “Public key encryption with keyword search", [4] in Eurocrypt 2004, Interlaken, Switzerland,May2-6,2004, pp.506-522. Consider a mail server that stores distinctive messages openly mixed for Alice by others. Using our framework Alice can send the mail server a key that will engage the server to recognize all messages containing a few watchwords, however get the hang of nothing else. We define the idea of
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3536 open key encryption with catchphrase chase and give a couple of improvements. N. Cao, C. Wang, M. Li, K. Ren, W. Lou, Privacy- preservingmultikeyword ranked search overencrypted cloud data",[5] IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222-233, Nov. 2013. The economical similarity live of coordinate matching," i.e., as several matches as attainable, to capture the connectedness of information documents to the search question. We further use “In ward thing comparability" to quantitatively survey such resemblance measure. We at first propose a key idea for the MRSE subject to anchor inside thing count, and after that give two basically upgraded MRSE wants to achieve diverse stringent assurance requirements in two particular threat 3. Proposed algorithm Fig-1:-System Architecture The data sharing scheme comprises of three different entities, Cloud Server, Data owner and Data sharer. 1) Data Owner: Data owner is an entity whose massive data will be uploaded to the cloud servers for storage and processing. It is either the patients or the hospital. 2) Data Sharer: Data sharer is an entity who will share the data owners' remote data. It may be the medical/health researcher, the medical/health research organization orthe relatives of the data owner. 3) Cloud Server: Cloud server is an entity whoismanaged by cloud service provider. It has enormous storage space and computation resource which are used to process the data owners' data. 4. Algorithm 1. ABE Which users can decrypt a cipher text will be decided by the attributes and policies related with the message and the client A focal expert will make mystery keys for the clients (like in IBE) in view of traits/arrangements for every client Steps: 1. Setup: The AA acts a PKG for AN IBE theme, running Setup to come up with the non-public key master −key and therefore the public values params. 2. Attribute List: (Optional) Alice obtains list of ordinary attribute varieties. (Note: no certificates.) 3. Policy: Alice determines her access policy f for a resource key κ in terms of the attribute set. 4. Encrypt: Alice computes cipher-text c = f[κ] using the AND & OR constructions described above. 5. Decryption: If he has private IBE keys ("verifiable" testaments) relating to characteristics fulfilling f, at that point Bob can unscramble c, yielding κ. 6. Authorization Request: Otherwise, Bob may request from the AA the secret IBE keys ("verifiable" testaments for attributes to which Bob is entitled. 5. CONCLUSION In the propose system, data sharing scheme which can achieve the anonymity and data confidentiality in public clouds. We formalize the definition and the protection model. Then, we designed a concrete data sharing scheme and gave the security proof. Security examination demonstrated our plan is provably secure in the proposed security show. Execution investigation demonstrated that our plan is relevant. REFERENCES [1] HUAQUN WANG1, 2 1Jiangsu Key Laboratory, Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-health Record," IEEE Transactions on Parallel Data Security Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China [2] C. Chu, S. Chow, W. Tzeng, J. Zhou, R. Deng, Key- aggregate cryptosystem for scalable data sharing in cloud storage," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp.468-477, Feb. 2014.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3537 [3] Y. Tong, J. Sun, S. Chow, P. Li, Cloud-assisted mobile- access of health data with privacy and audit ability", IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 2, Mar. 2014. [4] C. Fan, V. Huang, H. Rung, Arbitrary-stateattribute-based encryption with dynamic membership", IEEE Transactions on Computers, vol. 63, no. 8, pp. 1951-1961, Apr. 2013. [5] D. Boneh, G. Crescenzo, R. Ostrovskyy, G. Persianoz, Public key encryption with keyword search", in Euro crypt 2004, Interlaken, Switzerland, May 2-6, 2004, pp.506-522.
Download now