International Journal For Multidisciplinary Research
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Volume 5 Issue 5
Enabling Authentication and Access Control-based Data Sharing with Personal Information Hiding for Secure Cloud Storage
|Author(s)||Dhanprada Bhoite, Ankita Kamble, Vishakha Kamble, Prof S G Dhengre|
|Abstract||To improve the quality of healthcare and individual’s quality of life E-healthcare cloud system shown its potential unluckily, privacy and security slow down its general deployment and application there are many researches focusing on preserving the privacy of the electronic healthcare record (EHR) data. However, these works have two main limitations first, they only works on ‘black or white’ access control policy. Second, they suffer from the inference attack. This paper, for the first time, we design an inference attack-resistant e-healthcare cloud system with fine-grained access control we first propose a two-layer encryption scheme. To make sure an efficient and fine-grained access control over the EHR data, we design the first-layer encryption, where we develop a specialized access policy for each data attribute in the EHR, and encrypt them individually with high efficiency. To preserve the privacy of role attributes and access policies used in the first-layer encryption, we systematically build the second-layer encryption To take full benefit of the cloud server, we propose to let the cloud execute computationally concentrated works on behalf of the data user without knowing any sensitive information To preserve the access pattern of data attributes in the EHR, we additional construct a blind data retrieving protocol. We also show that our scheme can be easily extended to support search functionality. Finally, we conduct extensive security analyses and performance evaluations.|
|Keywords||Advance encryption standards, Personal data Abstraction, Anonymous authentication, rotating group signature, elliptic curve cryptography, smart health applications.|
|Published In||Volume 1, Issue 3, November-December 2019|
|Cite This||Enabling Authentication and Access Control-based Data Sharing with Personal Information Hiding for Secure Cloud Storage - Dhanprada Bhoite, Ankita Kamble, Vishakha Kamble, Prof S G Dhengre - IJFMR Volume 1, Issue 3, November-December 2019.|
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.