A Survey on an Efficient Technique of Encryption Scheme and its Extension in Cloud Based PHR System
نویسندگان
چکیده
Scalable and secure sharing of personal health record in cloud computing is an emerging trend in Health field for exchange and the use of personal Health information. This sensitive data is shared and stored by the third party reference in cloud computing. Therefore the need of encrypting data stored at this sites is highly essential to reduce the storage space and for the cost reduction. Since, the privacy management is a complex task in the PHR management process; the issues such as risk of privacy exposure, scalability, data loss, flexible access have remained the most important task. To achieve the fine grained and scalable data access, the ABE technique and its extensions are introduced in this paper. Here the focus is done on comparing the best method for achieving the fine grained and security. Keywords— Attribute Based Encryption (ABE), Cloud Computing, Cloud Data Security, Personal Health Record (PHR), MA-ABE, Proactive MA-ABE, CA, Data Privacy, Fine-grained access control.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملAn efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کامل