Paper Title : A use of proxy based re-encryption method for health sector services on cloud
ISSN : 2394-2231
Year of Publication : 2021
MLA Style: Ms. Archana Ashok Kulkarni, Prof. A.A.Phatak "A use of proxy based re-encryption method for health sector services on cloud " Volume 8 - Issue 1 January-February , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: Ms. Archana Ashok Kulkarni, Prof. A.A.Phatak "A use of proxy based re-encryption method for health sector services on cloud " Volume 8 - Issue 1 January-February , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
The across the board acknowledgment of cloud fundamentally based administrations inside the consideration part has brought about worth compelling and advantageous trade of non-general Health Records (PHRs) among many working together elements of the e-Health frameworks. However, putting away the secret wellbeing information to cloud servers is powerless against disclosure or burglary and requires the occasion of procedures that ensure the protection of the PHRs. In this manner, we tend to propose a procedure known as SeSPHR for secure sharing of the PHRs inside the cloud. The SeSPHR subject guarantees quiet driven administration on the PHRs and jelly the privacy of the PHRs. The patients store the encoded PHRs on the un-confided in cloud servers and by determination award access to contrasting sorts of clients on very surprising pieces of the PHRs. A semi-believed intermediary known as Setup and Re-encryption Server (SRS) is acquainted with line up people in general/private key sets and to give the re-encryption keys. Also, the procedure is secure against corporate official dangers and furthermore upholds an advance and in reverse access the executives. Additionally, we tend to officially dissect and confirm the working of SeSPHR system through the High Level Petri Nets (HLPN). Execution investigation identifying with time utilization demonstrates that the SeSPHR approach can possibly use for solidly sharing the PHRs inside the cloud.
 A. Abbas and S. U. Khan, “A Review on the State-of-the-Art Privacy Preserving Approaches in E-Health Clouds,” IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 4, pp. 1431-1441, 2014.  A. Abbas, K. Bilal, L. Zhang, and S. U. Khan, “A cloud based health insurance plan recommendation system: A user centered approach, “Future Generation Computer Systems, vols. 43-44, pp. 99-109, 2015.  M. H. Au, T. H. Yuen, J. K. Liu, W. Susilo, X. Huang, Y. Xiang, and Z. L. Jiang, “A general framework for secure sharing of personal health records in cloud system,” Journal of Computer and System Sciences, vol. 90, pp, 46-62, 2017.  R. Wu, G.-J. Ahn, and H. Hu, “Secure sharing of electronic health records in clouds,” In 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Work- sharing Collaborate Com), 2012, pp. 711-718.  J. Li, “Electronic personal health records and the question of privacy,” Computers, 2013, DOI: 10.1109/MC.2013.225.  Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,” IEEE Communications Surveys and Tutorials, vol. 15, no. 2, pp. 1–17, Jul. 2012.  T. S. Chen, C. H. Liu, T. L. Chen, C. S. Chen, J. G. Bau, and T.C. Lin, “Secure Dynamic access control scheme of PHR in cloud computing,” Journal of Medical Systems, vol. 36, no. 6, pp. 4005–4020, 2012.  Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,” IEEE Communications Surveys and Tutorials, vol. 15, no. 2, pp. 1–17, Jul. 2012.  T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” in Proceedings of CRYP-TO 84 on Advances Cryptology, 1985, pp. 10-18.  W. Diffie, and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, 1976, pp. 644-654.  D. Thilakanathan, S. Chen, S. Nepal, R. Calvo, and L. Alem, “A platform for secure monitoring and sharing of generic health data in the Cloud, ”Future Generation Computer Systems, vol.35, 2014, pp. 102-113.  S. U. R. Malik, S. U. Khan, and S. K. Srinivasan, “Modeling and Analysis of State-of-the-art VM-based Cloud Manage-ment Platforms, ”IEEE Transactions on Cloud Computing, vol. 1, no. 1, pp. 50-63, 2013.  T. Murata, “Petri Nets: Properties, Analysis and Applications, “Proceedings of the IEEE, vol. 77, no. 4, pp. 541-580, Apr. 1989.  L. D. Mouraand N. Bjørner. "Satisfiability modulo theories: An appetizer." InFormal Methods: Foundations and Applications, Springer Berlin Heidelberg, 2009, pp. 23-36.  A. Biere, A. Cimatti, E. Clarke, O. Strichman, and Y. Zhu, “Bounded Model Checking,” Advances in Computers, vol. 58, 2003, pp. 117-148.  A. D. Caro, and V. Iovino, “j PBC: Java pairing based cryptography,” in IEEE Symposium on Computers and Communications (ISCC), 2011, pp. 850-855.  L. Ibraimi, M. Asim, and M. Petkovic, Secure management of personal health records by applying attribute-based encryption, Technical Report, University of Twente, 2009.  J. Pecarina, S. Pu, and J.-C. Liu, “SAPPHIRE: Anonymity for enhanced control and private collaboration in healthcare clouds,” in Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2012, pp. 99–106.  M. Jafari, R. S. Naini, and N. P. Sheppard, “A rights manage-ment approach to protection of privacy in a cloud of electronic health records,” in 11th annual ACM workshop on Digital rights management, October 2011, pp. 23-30.  F. Xhafa, Fatos, J. Feng, Y. Zhang, X. Chen, and J. Li, “Privacy-aware attribute-based PHR sharing with user accountability in cloud computing, ”The Journal of Supercomputing,2014, pp. 1-13.  C. Leng, H. Yu, J.Wang, and J. Huang, “Securing personal health records in the cloud by enforcing sticky policies,” Telkomnika Indonesian Journal of Electrical Engineering, vol. 11, no. 4, pp. 2200–2208, 2013.  D.H Tran, N. H.-Long, Z. Wei, N. W. Keong, “Towards security in sharing data on cloud-based social networks,” in 8th In-ternational Conference on Information, Communications and Signal Processing (ICICS), 2011, pp. 1-5.  X. Liang, Zhenfu Cao, Huang Lin, and Jun Shao. "Attribute based proxy re-encryption with delegating capabilities." In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 276-286. ACM, 2009.  A. N. Khan, M.L. M. Kiah, S. U. Khan, Sajjad A. Madani, and Atta R. Khan. "A study of incremental cryptography for security schemes in mobile cloud computing environments." In Wireless Technology and Applications (ISWTA), 2013 IEEE Symposium on, pp. 62-67. IEEE, 2013.
Access Control, Cloud Computing, Personal Health Records, Privacy