{"title":"以患者为中心的个人健康记录云安全实验研究","authors":"B. Devender, Syed Abdul Sattar","doi":"10.34218/ijcet.10.1.2019.009","DOIUrl":null,"url":null,"abstract":"Cloud computing offers many services among one is Storage as a service. Using this service user can outsource his data and whenever required he can download or he can share with others. Using cloud computing PHR owner can share his documents, but due to security challenges in cloud computing the health records of owner must be encrypted before outsourcing. In order to provide security for owner health records ABE (attribute-based encryption) is best suitable for other encryption techniques. Using ABE the PHR owner can define access control over his encrypted cloud data. But using ABE dynamic polices over encrypted cloud data is big challenge. In this paper for achieving grant and revoke privileges over encrypted data Timestamp server is introduced.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Experimental Study on Cloud Security for Personal Health Records Over Patient Centric Data\",\"authors\":\"B. Devender, Syed Abdul Sattar\",\"doi\":\"10.34218/ijcet.10.1.2019.009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing offers many services among one is Storage as a service. Using this service user can outsource his data and whenever required he can download or he can share with others. Using cloud computing PHR owner can share his documents, but due to security challenges in cloud computing the health records of owner must be encrypted before outsourcing. In order to provide security for owner health records ABE (attribute-based encryption) is best suitable for other encryption techniques. Using ABE the PHR owner can define access control over his encrypted cloud data. But using ABE dynamic polices over encrypted cloud data is big challenge. In this paper for achieving grant and revoke privileges over encrypted data Timestamp server is introduced.\",\"PeriodicalId\":289043,\"journal\":{\"name\":\"InfoSciRN: Information Networks (Topic)\",\"volume\":\"91 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"InfoSciRN: Information Networks (Topic)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.34218/ijcet.10.1.2019.009\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"InfoSciRN: Information Networks (Topic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.34218/ijcet.10.1.2019.009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Experimental Study on Cloud Security for Personal Health Records Over Patient Centric Data
Cloud computing offers many services among one is Storage as a service. Using this service user can outsource his data and whenever required he can download or he can share with others. Using cloud computing PHR owner can share his documents, but due to security challenges in cloud computing the health records of owner must be encrypted before outsourcing. In order to provide security for owner health records ABE (attribute-based encryption) is best suitable for other encryption techniques. Using ABE the PHR owner can define access control over his encrypted cloud data. But using ABE dynamic polices over encrypted cloud data is big challenge. In this paper for achieving grant and revoke privileges over encrypted data Timestamp server is introduced.