scholarly journals A Homomorphic Encryption Technique for Scalable and Secure Sharing of Personal Health Record in Cloud Computing

2013 ◽  
Vol 67 (11) ◽  
pp. 40-44 ◽  
Author(s):  
Soubhagya B ◽  
Venifa Mini G ◽  
Jeya A. Celin J
2015 ◽  
Vol 2015 ◽  
pp. 1-9 ◽  
Author(s):  
S. Balasubramaniam ◽  
V. Kavitha

Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.


Presently, usage of Cloud computing is increasing, due to internet availability most of Personal Health Record (PHR) owners outsourcing their records to the cloud, but it is untrusted, so a security mechanism needed in this paper proposing Dynamic Time-based encryption (DTBE), it derived from classic ABE. In the past, many researchers suggested different access controls for secure PHR. Still, most of the access control mechanisms introduce burden to the PHR owner while performing dynamic operations insertion, PHR user revocation, and when it updates, PHR users attribute list. Most of the ABE schemes have several limitations as it cannot efficiently handle adding or revoking users or identity attributes. It needs to keep multiple encrypted copies of the same key that incurs high computational costs. So, there is a need for a suitable access control mechanism that should support effective policies.


Sign in / Sign up

Export Citation Format

Share Document