High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption in Health Cloud

Author(s):

Purva Ramdas Vavale , Bharati Vidyapeeths College of Engineering,Lavale,Pune; Pramod Salunkhe, Bharati Vidyapeeths College of Engineering,Lavale,Pune; Juilee Shivaji Kudale, Bharati Vidyapeeths College of Engineering,Lavale,Pune; Apurva Ramdas Vavale, Bharati Vidyapeeths College of Engineering,Lavale,Pune; Kalpeksha Krishna Surve, Bharati Vidyapeeths College of Engineering,Lavale,Pune

Keywords:

Cloud, Health Care, Delegate, Proxy, Conjuctive Keyword

Abstract

An electronic health (e-health) record system is a new and innovative application that will bring great convenience in healthcare. The privacy and security of the sensitive personal information are the major concerns of the users, which could hold back further development and widely adoption of the systems. The searchable cryptography (SE) theme could be a technology to include security protection and favorable operability functions along, which can play an important role in the e-health record system. In this paper, we introduce a new cryptographic primitive named as conjunctive keyword search with designated tester and timing enabled proxy re-encryption function (Re-dtPECK), which is a kind of time-dependent SE scheme. It could enable patients to envoy partial access rights to others to operate search functions over their records in a limited time period. The length of the period for the delegatee to look and decode the delegators encrypted documents may be controlled. Moreover, the delegate (Owner) might be mechanically bereft of the access and search authority when a such as amount of effective time. It can even support the conjunctive keywords search and resist the keyword dead reckoning attacks. By the answer, only the designated tester is able to test the existence of certain keywords. We formulate a system model associated a security model for the projected Re-dtPECK theme to point out that its an economical theme verified secure within the commonplace model. The comparison and intensive simulations demonstrate that its an occasional computation and storage overhead.

Other Details

Paper ID: IJSRDV7I110179
Published in: Volume : 7, Issue : 11
Publication Date: 01/02/2020
Page(s): 744-746

Article Preview

Download Article