SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN
CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION

ABSTRACT:

Personal health record (PHR) is an emerging patient-centric model of health information
exchange, which is often outsourced to be stored at a third party, such as cloud providers.
However, there have been wide privacy concerns as personal health information could be
exposed to those third party servers and to unauthorized parties. To assure the patients’ control
over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing.
Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and
efficient user revocation, have remained the most important challenges toward achieving finegrained, cryptographically enforced data access control.

In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data
access control to PHRs stored in semitrusted servers. To achieve fine-grained and scalable data
access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt
each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on
the multiple data owner scenario, and divide the users in the PHR system into multiple security
domains that greatly reduces the key management complexity for owners and users. A high
degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE. Our
scheme also enables dynamic modification of access policies or file attributes, supports efficient
on-demand user/attribute revocation and break-glass access under emergency scenarios.
Extensive analytical and experimental results are presented which show the security, scalability,
and efficiency of our proposed scheme.

More Related Content

Viewers also liked

Android region-based foldings in process discovery
Android  region-based foldings in process discoveryAndroid  region-based foldings in process discovery
Android region-based foldings in process discoveryEcway2004
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...Ecway2004
 
Fcb 531 Integracion con la comunidad
Fcb 531 Integracion con la comunidadFcb 531 Integracion con la comunidad
Fcb 531 Integracion con la comunidadKel Naru
 
Infografía smarter planet
Infografía smarter planetInfografía smarter planet
Infografía smarter planetBiblioteca EPM
 
Conceptos de contabilidad
Conceptos de contabilidadConceptos de contabilidad
Conceptos de contabilidadValentinaSilvaO
 
Android exploiting ubiquitous data collection for mobile users in wireless s...
Android  exploiting ubiquitous data collection for mobile users in wireless s...Android  exploiting ubiquitous data collection for mobile users in wireless s...
Android exploiting ubiquitous data collection for mobile users in wireless s...Ecway2004
 
Teaching foreign languages to very young learners
Teaching foreign languages to very  young learnersTeaching foreign languages to very  young learners
Teaching foreign languages to very young learnersYusra Abderrazak
 
Firma hanorable de lnauguracién de Tab'al Mayab'Oxlajuj Ajmaq
Firma hanorable de lnauguracién de Tab'al Mayab'Oxlajuj AjmaqFirma hanorable de lnauguracién de Tab'al Mayab'Oxlajuj Ajmaq
Firma hanorable de lnauguracién de Tab'al Mayab'Oxlajuj AjmaqDiego Cox
 
Andragogia. eneyda almao
Andragogia. eneyda almaoAndragogia. eneyda almao
Andragogia. eneyda almaoEneyda Almao
 

Viewers also liked (20)

Android region-based foldings in process discovery
Android  region-based foldings in process discoveryAndroid  region-based foldings in process discovery
Android region-based foldings in process discovery
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
 
Ejercicios
EjerciciosEjercicios
Ejercicios
 
ANÁLISIS DEL VIDEO ESCOGIDO
ANÁLISIS DEL VIDEO ESCOGIDOANÁLISIS DEL VIDEO ESCOGIDO
ANÁLISIS DEL VIDEO ESCOGIDO
 
Anderson
AndersonAnderson
Anderson
 
Lechuga yo
Lechuga yoLechuga yo
Lechuga yo
 
Fcb 531 Integracion con la comunidad
Fcb 531 Integracion con la comunidadFcb 531 Integracion con la comunidad
Fcb 531 Integracion con la comunidad
 
Sonríe
SonríeSonríe
Sonríe
 
Infografía smarter planet
Infografía smarter planetInfografía smarter planet
Infografía smarter planet
 
Cuál es el desafío
Cuál es el desafíoCuál es el desafío
Cuál es el desafío
 
Unidad i desarrollo psicomotor
Unidad i desarrollo psicomotorUnidad i desarrollo psicomotor
Unidad i desarrollo psicomotor
 
Proyecto de educacion fisica
Proyecto de educacion fisicaProyecto de educacion fisica
Proyecto de educacion fisica
 
Playlist
PlaylistPlaylist
Playlist
 
Conceptos de contabilidad
Conceptos de contabilidadConceptos de contabilidad
Conceptos de contabilidad
 
Android exploiting ubiquitous data collection for mobile users in wireless s...
Android  exploiting ubiquitous data collection for mobile users in wireless s...Android  exploiting ubiquitous data collection for mobile users in wireless s...
Android exploiting ubiquitous data collection for mobile users in wireless s...
 
Teaching foreign languages to very young learners
Teaching foreign languages to very  young learnersTeaching foreign languages to very  young learners
Teaching foreign languages to very young learners
 
Firma hanorable de lnauguracién de Tab'al Mayab'Oxlajuj Ajmaq
Firma hanorable de lnauguracién de Tab'al Mayab'Oxlajuj AjmaqFirma hanorable de lnauguracién de Tab'al Mayab'Oxlajuj Ajmaq
Firma hanorable de lnauguracién de Tab'al Mayab'Oxlajuj Ajmaq
 
Ensayo wujis
Ensayo wujisEnsayo wujis
Ensayo wujis
 
Metodo duncan para adelgazar
Metodo duncan para adelgazarMetodo duncan para adelgazar
Metodo duncan para adelgazar
 
Andragogia. eneyda almao
Andragogia. eneyda almaoAndragogia. eneyda almao
Andragogia. eneyda almao
 

Similar to Android scalable and secure sharing of personal health records in cloud computing using attribute-based encryption

Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...ecway
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...ecway
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Ecway Technologies
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...Ecway Technologies
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...ecway
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...ecwayerode
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...ecwayerode
 
Scalable and secure of personal health records in cloud computing using attri...
Scalable and secure of personal health records in cloud computing using attri...Scalable and secure of personal health records in cloud computing using attri...
Scalable and secure of personal health records in cloud computing using attri...Shakas Technologies
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...IEEEGLOBALSOFTTECHNOLOGIES
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...IEEEGLOBALSOFTTECHNOLOGIES
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...dbpublications
 

Similar to Android scalable and secure sharing of personal health records in cloud computing using attribute-based encryption (20)

Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
7
77
7
 
Scalable and secure of personal health records in cloud computing using attri...
Scalable and secure of personal health records in cloud computing using attri...Scalable and secure of personal health records in cloud computing using attri...
Scalable and secure of personal health records in cloud computing using attri...
 
Full paper
Full paperFull paper
Full paper
 
Full paper
Full paperFull paper
Full paper
 
Full paper
Full paperFull paper
Full paper
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
 

More from Ecway2004

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensorsEcway2004
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksEcway2004
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecway2004
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecway2004
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcway2004
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcway2004
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink pointsEcway2004
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networksEcway2004
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecway2004
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...Ecway2004
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecway2004
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titlesEcway2004
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed controlEcway2004
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Ecway2004
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecway2004
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcway2004
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcway2004
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcway2004
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless cameraEcway2004
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alertEcway2004
 

More from Ecway2004 (20)

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 

Android scalable and secure sharing of personal health records in cloud computing using attribute-based encryption

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION ABSTRACT: Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving finegrained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme.