SlideShare a Scribd company logo
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN
CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION

ABSTRACT:

Personal health record (PHR) is an emerging patient-centric model of health information
exchange, which is often outsourced to be stored at a third party, such as cloud providers.
However, there have been wide privacy concerns as personal health information could be
exposed to those third party servers and to unauthorized parties. To assure the patients’ control
over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing.
Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and
efficient user revocation, have remained the most important challenges toward achieving finegrained, cryptographically enforced data access control.

In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data
access control to PHRs stored in semitrusted servers. To achieve fine-grained and scalable data
access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt
each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on
the multiple data owner scenario, and divide the users in the PHR system into multiple security
domains that greatly reduces the key management complexity for owners and users. A high
degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE. Our
scheme also enables dynamic modification of access policies or file attributes, supports efficient
on-demand user/attribute revocation and break-glass access under emergency scenarios.
Extensive analytical and experimental results are presented which show the security, scalability,
and efficiency of our proposed scheme.

More Related Content

PDF
Dotnet scalable and secure sharing of personal health records in cloud compu...
DOCX
Dotnet scalable and secure sharing of personal health records in cloud compu...
PPTX
kpit ppt
DOCX
Scalable and secure of personal health records in cloud computing using attri...
PPTX
Scalable and secure sharing of personal health records in cloud computing usi...
PPTX
secured storage of Personal health record in cloude
PDF
Android target tracking and mobile sensor navigation in wireless sensor netw...
Dotnet scalable and secure sharing of personal health records in cloud compu...
Dotnet scalable and secure sharing of personal health records in cloud compu...
kpit ppt
Scalable and secure of personal health records in cloud computing using attri...
Scalable and secure sharing of personal health records in cloud computing usi...
secured storage of Personal health record in cloude
Android target tracking and mobile sensor navigation in wireless sensor netw...

Viewers also liked (14)

PDF
Android finding rare classes active learning with generative and discriminat...
PDF
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
PDF
Android security analysis of a single sign-on mechanism for distributed comp...
PDF
Android ranking on data manifold with sink points
PDF
Android distributed web systems performance forecasting using turning bands ...
PDF
Android region-based foldings in process discovery
PDF
Android t-drive enhancing driving directions with taxi drivers’ intelligence
PDF
Android toward privacy preserving and collusion resistance in a location pro...
PDF
Android discovery and verification of neighbor positions in mobile ad hoc ne...
PDF
Android exploiting ubiquitous data collection for mobile users in wireless s...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
UNIVERSITY CERTIFICATATION
PPTX
DOC
Mohammad Ramadan C.V
Android finding rare classes active learning with generative and discriminat...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android security analysis of a single sign-on mechanism for distributed comp...
Android ranking on data manifold with sink points
Android distributed web systems performance forecasting using turning bands ...
Android region-based foldings in process discovery
Android t-drive enhancing driving directions with taxi drivers’ intelligence
Android toward privacy preserving and collusion resistance in a location pro...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android exploiting ubiquitous data collection for mobile users in wireless s...
Anonymization of centralized and distributed social networks by sequential cl...
UNIVERSITY CERTIFICATATION
Mohammad Ramadan C.V
Ad

Similar to Android scalable and secure sharing of personal health records in cloud computing using attribute-based encryption (20)

PDF
Java scalable and secure sharing of personal health records in cloud computi...
DOCX
Java scalable and secure sharing of personal health records in cloud computi...
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
PDF
Java scalable and secure sharing of personal health records in cloud computi...
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
Java scalable and secure sharing of personal health records in cloud computi...
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
PDF
Android scalable and secure sharing of personal health records in cloud comp...
DOCX
Android scalable and secure sharing of personal health records in cloud comp...
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
Scalable and secure of personal health records in cloud computing using attri...
PDF
Full paper
PDF
Full paper
PDF
Full paper
PDF
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
PDF
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Java scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
Scalable and secure sharing of personal health records in cloud computing usi...
Java scalable and secure sharing of personal health records in cloud computi...
Scalable and secure sharing of personal health records in cloud computing usi...
Java scalable and secure sharing of personal health records in cloud computi...
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Android scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure of personal health records in cloud computing using attri...
Full paper
Full paper
Full paper
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Ad

More from Ecwaytechnoz (20)

PPTX
Wheelztracker.pptx
PDF
Coloring based inter-wban scheduling for mobile wireless body area networks
DOC
Code modulation based encryption & decryption technique for secure communicat...
PDF
Clustering sentence level text using a novel fuzzy relational clustering algo...
PDF
Clustering large probabilistic graphs
PDF
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
PDF
Cloudsim ranking on data manifold with sink points
PDF
Cloudsim quality-differentiated video multicast in multirate wireless networks
PDF
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
PDF
Cloudsim distributed web systems performance forecasting using turning bands...
PDF
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
DOCX
Civil 2013 titles
DOC
Chopper based dc motor speed control
PDF
Channel assignment for throughput optimization in multichannel multiradio wir...
PDF
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
PDF
Casual stereoscopic photo authoring
DOCX
Casual stereoscopic photo authoring
PDF
Capacity of hybrid wireless mesh networks with random a ps
DOC
Bomb detection robot with wireless camera
DOC
Bed side patients monitoring system with emergency alert
Wheelztracker.pptx
Coloring based inter-wban scheduling for mobile wireless body area networks
Code modulation based encryption & decryption technique for secure communicat...
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering large probabilistic graphs
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim ranking on data manifold with sink points
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Civil 2013 titles
Chopper based dc motor speed control
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Casual stereoscopic photo authoring
Casual stereoscopic photo authoring
Capacity of hybrid wireless mesh networks with random a ps
Bomb detection robot with wireless camera
Bed side patients monitoring system with emergency alert

Android scalable and secure sharing of personal health records in cloud computing using attribute-based encryption

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: [email protected] SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION ABSTRACT: Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving finegrained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme.