Multiple Attributes Based Secured Sharing Of Personal Health Records In Cloud Computing Using Blowfish Algorithm

Rinesh, S.; Baskaran, K.
June 2014
Australian Journal of Basic & Applied Sciences;Jun2014, Vol. 8 Issue 9, p13
Academic Journal
Personal Health Record (PHR) is a rising patient driven model of health data exchange, which is to be stored at a third party provider like cloud providers. So, there have been wide privacy is important for secure personal health information could be bare to those third party servers. Here blowfish algorithm is used for key generation, encryption and decryption, is more securable and fast data transmission is possible. In order to reduce the risks of privacy exposure, scalability in key management, flexible access, and Multiple Attributes Based key management is used. This Multiple Attribute Based encryption used public and secret key to process the operation. This paper, proposed a novel patient-centric framework Multiple Attributes Based encryption is used in PHR, and this mechanism is for data access Control to PHRs stored in semi trusted servers and also in two domains like Public and private domain, by using this key maintainability is reduced. Blowfish algorithm for fast and secure encryption. To attain fine-grained and adaptable data access control for PHRs, Multiple Attributes-Based encryption (MABE) techniques are used to encrypt each patient's PHR file. The coarse grained access control is used to manage the access requests which allow just constrained data from its inputs. This is attained by arranging the assets into units called access blocks and implementing access control at the cloud just at the granularity of blocks.


Related Articles

  • Enabling Similarity Search over Encrypted Images in Cloud. Yi Zhu; Xingming Sun; Zhihua Xia; Li Chen; Tao Li; Daxing Zhang // Information Technology Journal;2014, Vol. 13 Issue 5, p824 

    With the growing popularity of cloud computing, more and more users are willing to outsource their private data to the cloud. To ensure the security of data, data owners usually encrypted their private data before outsourcing them to the cloud server. Though data encryption improves the security...

  • Enhancing privacy in cloud computing via policy-based obfuscation. Mowbray, Miranda; Pearson, Siani; Shen, Yun // Journal of Supercomputing;Aug2012, Vol. 61 Issue 2, p267 

    In this paper, we describe a privacy manager for cloud computing that controls policy-based obfuscation and de-obfuscation of personal, sensitive, or confidential data within cloud service provision. By these means, cloud computing users may reduce the risk of their private data being stolen or...

  • Secure Data Sharing of Patient Record in Cloud Environment using Attribute Based Encryption. Sunny, Stiffy; Agilandeeswari, L. // International Journal of Applied Engineering Research;2013, Vol. 8 Issue 19, p2423 

    In the conventional method, the patient's record is stored either in the database or the server of the particular hospital or on the server of the third party vendor. In the former method, patient data will not be available to the hospital, which is at a different location. If the server is used...

  • Sharing of Personal Health Records Securely in Cloud Computing with Attribute Based Encryption. Muhib Anwar Lambay; M. Jhansi Lakshmi; Gamare, Pralhad S. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 5, p6864 

    Personal Health Records (PHR) are important health fields to store health information of a person. These records are stored on untrusted servers which makes secure data sharing a challenging task. In Cloud computing the cloud servers are usually operated by third-party, which are almost certain...

  • A COMPARATIVE STUDY OF THE SECRET SHARING ALGORITHMS FOR SECURE DATA IN THE CLOUD. Nirmala, S. Jaya; Saira Bhanu, S. Mary; Akhtar Patel, Ahtesham // International Journal on Cloud Computing: Services & Architectur;Aug2012, Vol. 2 Issue 4, p63 

    With advances in the field of cloud computing many computing resources and/or services are being provided to the end user on a pay-as-you-use basis. Data outsourcing is a new paradigm in which a third party provides storage services. This is more cost effective for the user as there is no need...

  • On Data and Virtualization Security Risks and Solutions of Cloud Computing. Xiangyang Luo; Lin Yang; Dai Hao; Fenlin Liu; Daoshun Wang // Journal of Networks;Mar2014, Vol. 9 Issue 3, p571 

    Data security and virtualization security issues are two key bottlenecks restricting the application of cloud computing promoting and applications, especially for the Cloud-based media computing system. In this paper, states of the art of the techniques on cloud computing data security issues,...

  • Performance Analysis of the Encryption Algorithms as Solution to Cloud Database Security. Baba, Murtala Aminu; Yusuf, Abdulrahman; Ahmad, Aminu; Maijama'a, Ladan // International Journal of Computer Applications;Aug2014, Vol. 99, p24 

    As the amount of data and information received and sent electronically increases in various Small and Medium Enterprises, companies and organizations, the adoption of cloud Database as a Service is becoming popular in the global business community. The operational burden encountered by users of...

  • A Result Analysis on Privacy-Preserving Public Auditing System of Data Storage Security in Cloud Computing through Trusted TPA. Yawale, Nupoor M.; Gadicha, V. B. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p4633 

    Cloud computing is an internet based computing which enables sharing of services. Cloud computing allows users to use applications without installation any application and access their personal files and application at any computer with internet or intranet access. Many users place their data in...

  • Efficient Keyword Search Scheme in Encrypted Cloud Computing Environment. Jiangang Shu; Xingming Sun; Lu Zhou; Jin Wang // International Journal of Grid & Distributed Computing;2014, Vol. 7 Issue 5, p65 

    With the increasing popularity of cloud computing, more and more sensitive or private information has been outsourced onto the cloud server. For protecting data privacy, sensitive data usually has to be encrypted before outsourcing, which makes traditional search techniques based on plaintext...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics