A Survey on an Efficient Technique of Encryption Scheme and its Extension in Cloud Based PHR System
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 10, Issue 6
Abstract
Scalable and secure sharing of personal health record in cloud computing is an emerging trend in Health field for exchange and the use of personal Health information. This sensitive data is shared and stored by the third party reference in cloud computing. Therefore the need of encrypting data stored at this sites is highly essential to reduce the storage space and for the cost reduction. Since, the privacy management is a complex task in the PHR management process; the issues such as risk of privacy exposure, scalability, data loss, flexible access have remained the most important task. To achieve the fine grained and scalable data access, the ABE technique and its extensions are introduced in this paper. Here the focus is done on comparing the best method for achieving the fine grained and security.
Authors and Affiliations
Prachi Dhavane , Dipak Patil
Network Monitoring and Analysis by Packet Sniffing Method
Today we are seeing that computer networks are increasing in their sizes very rapidly. Number of its user increased in past few years and traffic flows in networks also increased, so it’s very important to monitor...
An Overview on Vibration Analysis Techniques for the Diagnosis of Rolling Element Bearing Faults
Rolling element bearings comes under the critical category in many rotating machineries, mainly in chemical industry, aviation, nuclear power stations etc. Vibration monitoring and analysis is useful tool in t...
Energy Efficient Clustering using Jumper Firefly Algorithm in Wireless Sensor Networks
Wireless Sensor Network (WSN) is a major and very interesting technology, which consists of small battery powered sensor nodes with limited power resources. The sensor nodes are inaccessible to the user once they are dep...
Embedded System Of A Wireless-Based Theft Monitoring
-ZigBee is a new global standard for wireless communications with the characteristics of low-cost, low power consumption, and low data rate. The design and implementation of a ZigBee-based wireless theft monitoring...
Energy Aware and Anonymous Location Based Efficient Routing Protocol
Mobile Ad Hoc Networks (MANETs) uses anonymous routing protocols that hide node identities and routes from outside observers in order to provide anonymity protection. However the existing routing protocols produces high...