SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud

0
1525
SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud

SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud

Abstract

SeSPHR A Methodology for Secure Sharing of Personal Health Records in the Cloud.The Personal Health Record (PHR) is an emerging framework for exchanging health information, which is often stored on cloud servers.But there are still various privacy issues as personal health information could be discovered to unauthorized people.To guarantee patients control over their own PHRs, it is a method of encrypting PHRs before cloud storage.

Introduction

As a standard health report, personal health record (PHR) has been raised today. A PHR model allows a user (patient) to create, manage, and control health data at a central location through web technology, making information storage, retrieval, and sharing more efficient. Here each patient is allowed to take full control of medical records and share health information with a variety of users, including medical report providers, family members and friends.

But still issues such as privacy risks, key administration efficiency, flexible access, and efficient user administration remained the major challenges to achieving better, cryptographically imposed data access control.In this research paper, we develop a model and mechanism for controlling data access to PHRs stored in cloud servers.To achieve efficient and modular data access control for PHRs, we provide ABE encryption to encrypt each PHR file.

Advantages  

  • System can work with any type of encrypted data without any third party dependency.
  • Complexity of minimum time.
  • System can work with big data.
  • It can be applied to both structured and semi-structured data.
  • Can achieve RBAC for the end user.

Disadvantages  

  • There are only one disadvantages for the system, searching depends on the generation of keyword trapdoor, if some words generate wrong trapdoor when there is no backgrond knowledge, then the system generates false positive ratio.

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
RAM                      : 256 MB(min)
Hard Disk              : 20 GB
Floppy Drive          : 1.44 MB
Key Board             : Standard Windows Keyboard
Mouse                  : Two or Three Button Mouse
Monitor                : SVGA
S/W System Configuration

Platform                     :  cloud computing

Operating system       : Windows Xp,7,
Server                       : WAMP/Apache
Working on                : Browser Like Firefox, IE

Conclusion

Data security is the biggest cloud storage problem. Using the Enhance MA ABE scheme, revocation on demand is possible better. In practical cases, a few more problems will arise. In this case, the main issue is trying to implement working flow-based conditions. To solve these needs attribute-based broadcast encryption (ABBE).