Secure Sharing of Personal Health Record in Server withOn-track ECG Monitoring
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Personal Health Record (PHR) paved the way to the patient centric model of health information exchange. This service allows a patient to create, manage, and control her personal health data in one place through the web, which has made the storage, retrieval, and sharing of the medical information more efficient. But there have been wide privacy concerns about whether the patients could actually control the sharing of their sensitive Personal Health Information (PHI). This paper proposes a new patient centric framework and mechanisms for data access control to PHRs stored in semi-trusted servers using Attribute Based Encryption (ABE) technique. It focuses on the multiple data owner scenario, and divides the users in the PHR system into multiple security domain that greatly reduces the key management complexity for owners and users. It alsoproposes a new application for the on-track monitoring of patient’s health data with the help of ECG device where communication between client and server is achieved through the GPRS network. The utilization of electrocardiogram transmission will improve efficiency of medical care and service for patients if they could be monitored constantly by health care providers. AES and ABE encryption techniques are used in my work
Authors and Affiliations
Dona Mary Thomas
Design and Development of an Integrated Platform for GSM, Web and Speech Based Device Controlling System
Abstract: In this modern era, as information technology is growing so far from the computing to communication, home automation is becoming a crucial area in research. In this proposed work, focus has been given on the de...
Mine music
Abstract : This technical report describes the implementation details of a music recommendation system based on data mining techniques. The system enables the user to receive a playlist depending on his mood and ag...
Visual Cryptography Implementation with Key Sharing For Effective Phishing Detection Process
The advent of the internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal, confidential information such...
Optimized Hypergraph Based Social Image Search Using Visual-Textual Joint Relevance Learning
Abstract: Recent years have witnessed a great success of social media websites. Tag-based image search is an important approach to access the image content of interest on these websites. However, the existing ranki...
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimensional Spatial Data
Mining knowledge from large amounts of spatial data is known as spatial data mining. It becomes a highly demanding field because huge amounts of spatial data have been collected in various applications ranging fr...