On demand security for Personal Health Record in cloud computing

Cloud computing is used broadly in several services that maintain Personal Health Record (PHR). It is a patient health-centric model for data exchange in cloud. Personal Health Record (PHR) is often keeping in a third party server i.e. cloud server. The major problems raised in existing approaches are fine-grained access, cryptographically access control, measurability in key management and effective on-demand user revocation. We would like to provide the secure sharing of patient health information in PHR data. This paper predominantly considers the multi-owner scenario and divides the user in PHR system into multiple security domains that greatly reduces the key management issues. A high degree of patient privacy is enriched at the same time by developing Multi-Authority Attribute based mostly cryptography (MA-ABE). We have to improve the security of Personal Health information and set access privileges for every PHR data. Before taking a key to decipher the PHR record in multiple owner scenarios it must raise some security queries on PHR owner.

[1]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[2]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[3]  R.T.Subhalakshmi,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption , 2016 .

[4]  Cong Wang,et al.  Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.

[5]  Yupu Hu,et al.  An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[6]  Dong Kun Noh,et al.  Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.

[7]  Yupu Hu,et al.  A key-policy attribute-based broadcast encryption , 2013, Int. Arab J. Inf. Technol..

[8]  Peter Teufl,et al.  Attribute-Based Encryption Goes X.509 , 2015, 2015 IEEE 12th International Conference on e-Business Engineering.

[9]  Xianchao Zhu,et al.  Multi-authority Attribute Based Encryption with Attribute Revocation , 2014, CSE.

[10]  Xiaodong Lin,et al.  Ciphertext Policy Attribute Based Encryption with Efficient Revocation , 2009 .

[11]  Brent Waters,et al.  Secure attribute-based systems , 2010, J. Comput. Secur..

[12]  Brent Waters,et al.  Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.

[13]  Brent Waters,et al.  Secure attribute-based systems , 2006, CCS '06.

[14]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[15]  Hideki Imai,et al.  Conjunctive Broadcast and Attribute-Based Encryption , 2009, Pairing.

[16]  Ming Li,et al.  Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.