Vahidhunnisha J., Ramasamy ., Balasubramaniam T


PHRs grant patients access to a wide range of health information sources, best medical practices and health knowledge. In patient centric secure sharing, patients will create, manage and control their personal health data from one place using the web. In cloud computing, it is attractive for the health record service providers to shift their patients data applications and storage into the cloud, in order to like the flexible resources and diminish the operational cost, but by storing health records in the cloud, the patients be unable to find physical control to their personal health data, which makes it required for each patient to encrypt the data prior to uploading to the cloud servers. Under encryption, it is difficult to achieve fine-grained access control to personal health data in a scalable and well-organized way. Existing cryptographic enforced access control schemes are mostly designed for the single-owner scenarios. In this, suggest a patient-centric frame work and a suite of mechanism for data access control to PHRs stored in semi-trusted servers. To allow fine-grained and scalable access control for PHRs, control attribute based encryption (ABE) techniques to encrypt every patients data. Different from earlier works in protected data outsourcing, center on the multiple data owner scenario, and separate the user in the system into multiple security domains that really decreases the key managing complexity for owners and users. In this way, a high degree of patient privacy is assured concurrently by developing multi-authority ABE.


Cloud computing; Multi-authority; Personal Health Records; Fine-grained access control;


M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings”, in SecureComm’10, Sept. 2010, pp. 89–106.

H. Lo¨ hr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health cloud“, in Proceedings of the 1st ACM International Health Informatics Symposium, ser. IHI ’10, 2010, pp. 220– 229.

M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword search over encrypted Personal health records in cloud computing”, in ICDCS ’11, Jun. 2011.

Y.Zheng,”Key-Policy Attribute- Base Encryption Scheme Implementation,”,2012.

Zhibin Zhou, Dijiang Huang,”On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption”,Proc. Third Int’l Conf.Palo Alto on Pairing-Based Cryptography-Pairing, pp. 248-265, 2009.

S.Ruj, A.Nayak, and I. Stejmenovic, ”Distributed Access Control in Clouds”,Proc.IEEE10th Intl Conf.Theory and Applications of Cryptographic Techniques: Advances in Cryptology,pp. 568-588,2011.

J.Bethencourt, A. Sahai, and B. Waters. “Ciphertext-Policy Attribute- Based Encryption.” Proc. IEEE Symp. Security and Privacy(SP ’07), pp. 321-334, 2007.

K. D. Mandl, P. Szolovits, and I. S. Kohane, “Public standards and patients’ control: how to keep electronic medical records accessible but private”, BMJ, vol. 322, no. 7281, p. 283, Feb. 2001.

J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient con trolled encryption: ensuring privacy of electronic medical record s”,‖ in CCSW ’09, 2009, pp. 103–114.

S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing”, in IEEE INFOCOM’10, 2010.

C. Dong, G. Russello, and N. Dulay, ”Shared and searchable encrypted data for untrusted servers”, in Journal of Computer Security, 2010.

V. Goyal, O. Pandey, A. Sahai and B. Waters, ”Attribute-based encryption for a fine grained access control of encrypted data’’, in CCS 06, 2006, pp. 89-98.

M. Li, W. Lou and K. Ren, “Data security and Privacy in wireless body area network”, IEEE Wireless Communication Magazine, Feb.

A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,‖ in ACM CCS”, ser. CCS ’08, 2008, pp. 417–426.

J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” Proc. ACM Workshop Cloud Computing Security (CCSW ’09), pp. 103-114, 2009.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at