Auditable Health Records Levering DROPS in Cloud
Tejaswi Wani1 , Roshani Raut2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-5 , Page no. 1095-1100, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.10951100
Online published on May 31, 2019
Copyright © Tejaswi Wani, Roshani Raut . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Tejaswi Wani, Roshani Raut, “Auditable Health Records Levering DROPS in Cloud,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1095-1100, 2019.
MLA Style Citation: Tejaswi Wani, Roshani Raut "Auditable Health Records Levering DROPS in Cloud." International Journal of Computer Sciences and Engineering 7.5 (2019): 1095-1100.
APA Style Citation: Tejaswi Wani, Roshani Raut, (2019). Auditable Health Records Levering DROPS in Cloud. International Journal of Computer Sciences and Engineering, 7(5), 1095-1100.
BibTex Style Citation:
@article{Wani_2019,
author = {Tejaswi Wani, Roshani Raut},
title = {Auditable Health Records Levering DROPS in Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1095-1100},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4367},
doi = {https://doi.org/10.26438/ijcse/v7i5.10951100}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.10951100}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4367
TI - Auditable Health Records Levering DROPS in Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - Tejaswi Wani, Roshani Raut
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1095-1100
IS - 5
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
265 | 260 downloads | 142 downloads |
Abstract
In this paper, the system proposed a Lightweight Sharable and Traceable (LiST) secure framework in which tolerant information is scrambled end-to-end from a patient’s cell phone to clients. In this system, a sensor attached on the patient body to collect all the signals from the wireless sensors and sends them to the base station; they are able to sense the heart rate, blood pressure and so on. This system can detect the abnormal conditions, issue an alarm to the Patient and send an SMS/E-mail to the physician. The main advantage of this system in comparison to previous systems is to reduce energy consumption and security. In this system, DROPS methodology divides a file into fragments and replicates the fragmented data over the cloud nodes. Each of the nodes stores only a single fragment of a particular data file that ensures that even in case of a successful attack, no meaningful information is revealed to the attacker. The attribute authorities (AAs) are responsible for performing user legitimacy verification and generating intermediate keys for legitimacy verified users.
Key-Words / Index Term
Access control, search-able encryption, tractability, user revocation, mobile health system, cloud security, fragmentation, replication, performance, WBSN, EHR
References
[1] L. Guo, C. Zhang, J. Sun, Y. Fang. A privacy-preserving attribute based authentication System for Mobile Health Networks, IEEE Transactions on Mobile Computing, 2014, vol. 13, no. 9, pp. 1927- 1941.
[2] A. Abbas, S. Khan, A review on the state-of-the-art privacy preserving approaches in e-health clouds, IEEE Journal of Biomedical Health Infor-matics, 2014, vol. 18, pp. 1431-1441.
[3] J. Yang, J. Li, Y. Niu, A hybrid solution for privacy preserving medical data sharing in the cloud environment, Future Generation Computer Systems, 2015, vol. 43-44, pp. 74-86.
[4] http://www.pbs.org/newshour/updates/has-health-care-hacking -become-an-epidemic/.
[5] V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proc. 13thm ACM Conf. Computer and Comm. Security (CCS06), Vol. 10, pp. 89-98, 2006.
[6] R. Ostrovsky, A. Sahai, B.Waters, Attribute-based encryption with non-monotonic access structures, in: Proceedings of the 14th ACM Conference on Computer and Communications Security, ACM, 2007, Vol.12, pp. 195-203.
[7] J. Han, W. Susilo, Y. Mu. Improving privacy and security in decentralized ciphertext-policy attribute-based encryption, IEEE Transactions on on Information Forensics and Security, 2015, vol. 10, no. 3, 665-678
[8] M. Li, S. Yu, Y. Zheng, K. Ren,W. Lou. Scalable and secure sharing of personal health records in cloud computing using attributebased encryption, IEEE transactions on parallel and distributed systems, 2013, 24(1): 131-143.
[9] M. Green, S. Hohenberger, B. Waters, Outsourcing the decryption of ABE ciphertexts, in Proc. USENIX Security Symp., San Francisco, CA, USA, 2011.
[10] J. Lai, R. H. Deng, C. Guan, J. Weng, Attribute-based encryption with verifiable outsourced decryption, IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
[11] B. Qin, R. H. Deng, S. Liu, S. Ma, Attribute-based encryption with efficient verifiable outsourced decryption, IEEE Trans. Inf. Forensics Security, vol. 10, no. 7, pp. 1384-1394, JULY. 2015
[12] Spvryans International Journal of Engineering Sciences & Technology (SEST) ISSN : 2394-0905 Design of a Cloud Based Emergency Health-care Service Model