Loading

A Novel Method for Patient Centric Secure and Scalable sharing of PHR in Cloud Computing using Encryption
Shaheen Taj S.A1, Prathibha Kiran2, Elavarasi3

1Shaheen Taj S.A, M.Tech, Department of ECE, AMC Engineering College, Bangalore, India
2Prathibha Kiran, Associate Professor, Department of ECE AMC Engineering College, Bangalore, India.
3Elavarasi, Associate Professor, Department of ECE AMC Engineering College, Bangalore, India.
Manuscript received on April 04, 2013. | Revised Manuscript received on April 28, 2013. | Manuscript published on May 05, 2013. | PP: 226-232 | Volume-3, Issue-2, May 2013. | Retrieval Number: B1508053213/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: PHRs grant patients access to a wide range of health information sources, best medical practices and health knowledge. In patient centric secure sharing, patients will create, manage and control their personal health data from one place using the web. Prior to storing the records in cloud server, they are encrypted using encryption algorithm which ensures the patient’s full control over their PHR. In addition to PHR (Medical history, current exams), personal files, insurance details and sensitive information can also be stored and shared. Patients only decide which set of users can access which set of files. All the files stored in clouds which are semi-trusted servers, are in the encrypted form and are confidential to other users. We make use of Attribute Based encryption (ABE) to encrypt the files. In this scheme, users are categorized into personal and professional domains which greatly reduce the key management complexity. There is a structured way to access the files for personal and professional purposes. Patients are able to dynamically modify the access policy and attributes.
Keywords: Attribute Based Encryption, Cipher, DES, Feistel.