Attribute Based Encryption for Scalable and Secure Sharing of Medical Records in Cloud Computing Design and Implementation | Abstract

ISSN ONLINE(2320-9801) PRINT (2320-9798)

Research Article Open Access

Attribute Based Encryption for Scalable and Secure Sharing of Medical Records in Cloud Computing Design and Implementation

Abstract

Cloud Computing servers provides promising platform for storage of data. Sharing of personal medical records is an emerging patient centric model of health information exchange, which is often outsourced to store at third party, such as cloud providers. The confidentiality of the medical records is major problem when patients use commercial cloud servers to store their medical records because it can be view by everyone, to assure the patients’ control over access to their own medical records; it is a promising method to encrypt the files before outsourcing and access control should be enforced though cryptography instead of role based access control. There are various other issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. To achieve fine grained and scalable data access control for medical records stored in semi trusted servers, we leverage attribute based encryption (ABE) techniques to encrypt each patient’s medical record file. In this paper, we describe a new approach which enables secure storage and controlled sharing of patient’s health data. We explore keypolicy attribute based encryption and multi-authority attribute based encryption to enforce patient access control policy such that everyone can download the data ,but only authorize user can view the medical records. This project also supports multiple owner scenarios and divides the users in the system into multiple security domains that greatly reduce the key management complexity for owners and users. A high degree of patient privacy is guaranteed by exploiting multi-authority ABE. In this paper we presents the detail design of modules and implementation Packages of the proposed framework.

Bharti Ratan Madnani, Sreedevi N

To read the full article Download Full Article | Visit Full Article