JETIREXPLORE- Search Thousands of research papers



Published in:

Volume 7 Issue 6
June-2020
eISSN: 2349-5162

Unique Identifier

JETIR2006057

Page Number

405-410

Share This Article


Title

Data Sharing by Enabling authentication and Access control with Credential Information Hiding

ISSN

2349-5162

Cite This Article

"Data Sharing by Enabling authentication and Access control with Credential Information Hiding", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 6, page no.405-410, June-2020, Available :http://www.jetir.org/papers/JETIR2006057.pdf

Abstract

To improve the quality of healthcare and individual’s quality of life E-healthcare cloud system shown its potential unluckily, privacy and security slow down its general deployment and application there are many researches focusing on preserving the privacy of the electronic healthcare record (EHR) data. However, these works have two main limitations first, they only works on ‘black or white’ access control policy. Second, they suffer from the inference attack. This paper, for the first time, we design an inference attack-resistant E-healthcare cloud system with fine-grained access control we first propose a two-layer encryption scheme. To make sure an efficient and fine-grained access control over the EHR data, we design the first-layer encryption, where we develop a specialized access policy for each data attribute in the EHR, and encrypt them individually with high efficiency. To preserve the privacy of role attributes and access policies used in the first-layer encryption, we systematically build the second-layer encryption To take full benefit of the cloud server, we propose to let the cloud execute computationally concentrated works on behalf of the data user without knowing any sensitive information To preserve the access pattern of data attributes in the EHR, we additional construct a blind data retrieving protocol. We also show that our scheme can be easily extended to support search functionality. Finally, we conduct extensive security analyses and performance evaluations.

Key Words

Advance encryption standards, Personal data Abstraction, Anonymous authentication,

Cite This Article

"Data Sharing by Enabling authentication and Access control with Credential Information Hiding", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 6, page no. pp405-410, June-2020, Available at : http://www.jetir.org/papers/JETIR2006057.pdf

Publication Details

Published Paper ID: JETIR2006057
Registration ID: 233837
Published In: Volume 7 | Issue 6 | Year June-2020
DOI (Digital Object Identifier):
Page No: 405-410
ISSN Number: 2349-5162

Download Paper

Preview Article

Download Paper




Cite This Article

"Data Sharing by Enabling authentication and Access control with Credential Information Hiding", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 6, page no. pp405-410, June-2020, Available at : http://www.jetir.org/papers/JETIR2006057.pdf




Preview This Article


Downlaod

Click here for Article Preview