High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Data Security Application In Cloud Environment Using Cp-Abe Encryption : Phr Systems

Author(s):

Anu Maria Sebastian , St Joseph's College of Engineering and Technology ; Deepu Job, St Joseph's College of Engineering and Technology ; Anjali Nair, St Joseph's College of Engineering and Technology ; Shalin Elizabeth, St Joseph's College of Engineering and Technology

Keywords:

MyPHR machines were created based on the remote virtual machines hosted in the cloud. It takes the support of medical software to feed in the data which makes it more trustworthy. The reuse of valuable legacy software eases the task rebuilding the entire platform from scratch. For each patient a set of attributes are maintained at the database. While their data are stored in the encrypted form in a server. MyPHR Machines have different units which include hospitals, doctors, patients and emergency users. All the users need to register to the corresponding units and the PHR admin grants permission to operate in their environment. The doctors can register via the registered hospitals. Emergency users are allowed access only with explicit delegation by the patient. While registration the information related to each user is stored as attributes in the database. These attributes are taken during the encryption of their respective data based on the policy. Cipher Policy Based ABE encryption method[4] uses the attri

Abstract

MyPHR machines were created based on the remote virtual machines hosted in the cloud. It takes the support of medical software to feed in the data which makes it more trustworthy. The reuse of valuable legacy software eases the task rebuilding the entire platform from scratch. For each patient a set of attributes are maintained at the database. While their data are stored in the encrypted form in a server. MyPHR Machines have different units which include hospitals, doctors, patients and emergency users. All the users need to register to the corresponding units and the PHR admin grants permission to operate in their environment. The doctors can register via the registered hospitals. Emergency users are allowed access only with explicit delegation by the patient. While registration the information related to each user is stored as attributes in the database. These attributes are taken during the encryption of their respective data based on the policy. Cipher Policy Based ABE encryption method[4] uses the attributes, based on the policy defined and decided by the provider and client. The final encryption is done using Blow Fish algorithm. The encrypted data is stored in servers. The decryption key is generated during the time of encryption. Only the patient could view his data unless he entrusts a trustworthy person to access the shared data in case of emergency. The implemented system mainly focuses on this encryption and decryption of data. Rests of the features of MyPHR Machines are maintained. This work has great applications in the future where the Health centres prefer to use a unified record of heath information regarding a person irrespective of his location.

Other Details

Paper ID: IJSRDV3I90421
Published in: Volume : 3, Issue : 9
Publication Date: 01/12/2015
Page(s): 587-590

Article Preview

Download Article