Efficient Techniques For Fine Grained Data Access Control In Cloud

Abstract

This work presents the design and implementation of Personal Health Records and providing security to them while they are stored at third party such as cloud. Personal Health Record is web based application that allows people to access and co-ordinate their lifelong health information. The patients have control over access to their own PHR. To achieve security of personal health records we use the attribute based encryption to encrypt the data before outsourcing it. Here we focus on multiple types of PHR owner scenario and division of personal health records users into multiple security domains which reduce key management complexity for owners and users. A high degree of patient’s privacy is guaranteed. Our scheme gives personal health record owner full control of his/her data. Extensive security and performance analysis shows that the proposed scheme is highly efficient.

Authors and Affiliations

A. Koti Babu, K. Hari Prasad, Ch. T. G. Ramya

Keywords

Related Articles

Comparison Study Among Various Anomaly Detection Techniques

Many approaches are implemented for the detection of anomalies on the system. Anomalies based approaches are considered as efficient from that user intention based approach is preferred for the implementation of anom...

Annotation Wrapper for Annotating The Search Result Records Retrieved From Any Given Web Database

An annotation wrapper for the search site is automatically created and can be used to interpret new result pages from the similar web database. The data units arrived from the fundamental database are generally encod...

Multichannel Contact Center

A Contact Center is a central point in an organization from which a customer contact is being managed. Contact Center plays an important role in one-to-one customer interactions. Multichannel provides various channel...

Analysis of Rabin and RSA Cryptosystems Using Bit Shifting and Stuffing (BSS) Technique

The important categories of network security application are to reduce the transmitted data size and to improve the security of the data. Compression of data before the transmission can reduce network transmission ti...

Performance Based Symmetric Load Balancing Algorithm

Mainly Distributed Hash Table uses decentralized load balance algorithms which are based on virtual servers for participating in asymmetric peers. Require the participating peers to be asymmetric, thereby introducing...

Download PDF file
  • EP ID EP27711
  • DOI -
  • Views 261
  • Downloads 4

How To Cite

A. Koti Babu, K. Hari Prasad, Ch. T. G. Ramya (2013). Efficient Techniques For Fine Grained Data Access Control In Cloud. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27711