Implementation of Mobile-Healthcare using Cloud Computing with Access Control, Security and Privacy

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4

Abstract

"Distributed m-healthcare cloud computing system significantly facilitates efficient patient treatment for medical consultation by sharing personal health information among healthcare providers. However, it brings about the challenge of keeping both the data confidentiality and patients’ identity privacy simultaneously. Many existing access control and anonymous authentication schemes cannot be straightforwardly exploited. To solve the problem, in this paper, a novel authorized accessible privacy model (AAPM) is established. Patients can authorize physicians by setting an access tree supporting flexible threshold predicates. Then, based on it, by devising a new technique of attribute-based designated verifier signature, a patient selfcontrollable multi-level privacy-preserving cooperative authentication scheme (PSMPA) realizing three levels of security and privacy requirement in distributed m-healthcare cloud computing system is proposed. The directly authorized physicians, the indirectly authorized physicians and the unauthorized persons in medical consultation can respectively decipher the personal health information and/or verify patients’ identities by satisfying the access tree with their own attribute sets. Finally, the formal security proof and simulation results illustrate our scheme can resist various kinds of attacks and far outperforms the previous ones in terms of computational, communication and storage overhead"

Authors and Affiliations

Keywords

Related Articles

A Review Paper on Crack Detection and Restoration of Old Painting

Everyday digital image processing is used in all areas of science. With the help of image processing tools, various digital image processing can be applied for restoration of old painting. Ancient paintings are cultural...

An Approach towards Recognition of Size and Shape Independent Bangla Handwritten Numerals

This paper presents an approach to recognize off-line Bangla numeral. Today there are many OCR used to recognize Bangla numeral. The recognition of handwritten character is still a challenging work in the field of patter...

Uses of Plant Conservation by the Tribes of Amarkantak District, Madhya Pradesh, India

The present paper deals with 30 plants species which are conserved by the tribes of Amarkantak district Anuppur Madhya Pradesh . Due to destruction of habitat, biotic interference and indiscriminate exploitation of natur...

Numerical Investigation of a Single Phase Air Flow inside Porous Media of a Cross Flow Cooling Tower

Cooling tower in the HVAC industry is used to reject heat from a system. The refrigeration cycle requires that the heat absorbed from a refrigerated space be rejected and this is done through the condenser where the wate...

Comparison of Vaginal Misoprostol and Foley Catheter for Cervical Ripening

"OBJECTIVES: To compare the efficacy and safety of intravaginal misoprostol with transcervical foley catheter for cervical ripening. MATERIAL AND METHODS: The present study was a prospective study and was conducted in t...

Download PDF file
  • EP ID EP363718
  • DOI -
  • Views 126
  • Downloads 0

How To Cite

(2015). Implementation of Mobile-Healthcare using Cloud Computing with Access Control, Security and Privacy. UNKNOWN, 4(4), -. https://europub.co.uk/articles/-A-363718