International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 6 Issue 3 May-June 2024 Submit your research before last 3 days of June to publish your research paper in the issue of May-June.

Enabling Authentication and Access Control-based Data Sharing with Personal Information Hiding for Secure Cloud Storage

Author(s) Dhanprada Bhoite, Ankita Kamble, Vishakha Kamble, Prof S G Dhengre
Country -
Abstract To improve the quality of healthcare and individual’s quality of life E-healthcare cloud system shown its potential unluckily, privacy and security slow down its general deployment and application there are many researches focusing on preserving the privacy of the electronic healthcare record (EHR) data. However, these works have two main limitations first, they only works on ‘black or white’ access control policy. Second, they suffer from the inference attack. This paper, for the first time, we design an inference attack-resistant e-healthcare cloud system with fine-grained access control we first propose a two-layer encryption scheme. To make sure an efficient and fine-grained access control over the EHR data, we design the first-layer encryption, where we develop a specialized access policy for each data attribute in the EHR, and encrypt them individually with high efficiency. To preserve the privacy of role attributes and access policies used in the first-layer encryption, we systematically build the second-layer encryption To take full benefit of the cloud server, we propose to let the cloud execute computationally concentrated works on behalf of the data user without knowing any sensitive information To preserve the access pattern of data attributes in the EHR, we additional construct a blind data retrieving protocol. We also show that our scheme can be easily extended to support search functionality. Finally, we conduct extensive security analyses and performance evaluations.
Keywords Advance encryption standards, Personal data Abstraction, Anonymous authentication, rotating group signature, elliptic curve cryptography, smart health applications.
Field Engineering
Published In Volume 1, Issue 3, November-December 2019
Published On 2019-12-15
Cite This Enabling Authentication and Access Control-based Data Sharing with Personal Information Hiding for Secure Cloud Storage - Dhanprada Bhoite, Ankita Kamble, Vishakha Kamble, Prof S G Dhengre - IJFMR Volume 1, Issue 3, November-December 2019.

Share this