JETIREXPLORE- Search Thousands of research papers



Published in:

Volume 7 Issue 6
June-2020
eISSN: 2349-5162

Unique Identifier

JETIR2006138

Page Number

988-991

Share This Article


Title

Securely Sharing Re-Encrypted PHR in cloud computing with Auditing

ISSN

2349-5162

Cite This Article

"Securely Sharing Re-Encrypted PHR in cloud computing with Auditing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 6, page no.988-991, June-2020, Available :http://www.jetir.org/papers/JETIR2006138.pdf

Abstract

In the health care sector has resulted in price effective and convenient exchange of private Health Records (PHRs) among several collaborating entities of the e-Health systems. Therefore, we've a bent to tend to propose how cited as SeSPHR for secure sharing of the PHRs among the cloud. The SeSPHR theme ensures patient-centric management on the PHRs and preserves the confidentiality of the PHRs. The patients store the encrypted PHRs on the un-trusted cloud servers and selectively grant access to differing types of users on whole totally different components of the PHRs. A semi-trusted proxy cited as Setup and Re-encryption Server (SRS) is introduced to line up the public/private key pairs and to supply the re-encryption keys. Moreover, the methodology is secure against executive threats and put together enforces a forward and backward access management. Moreover, we've a bent to tend to formally analyze and verify the operational of SeSPHR methodology through the High Level Petri Nets (HLPN). Performance analysis regarding time consumption indicates that the SeSPHR methodology has potential to use for firmly sharing the PHRs among the cloud. put together we've a bent to tend to Implement as a contribution throughout this paper time Server, Secure Auditing Storage, in Time Server PHR Owner add the start and Ending time attach to uploaded Encrypted files, and put together implement the TPA Module for verify the PHR Record its hack or corrupted for the other hacker and person if data hack from hacker side discover all system details of person like Macintosh Address and knowledge science Address its our contribution in our project.

Key Words

Access control, cloud computing, Personal Health Records, privacy, Time Server, Auditing, Proxy Server.

Cite This Article

"Securely Sharing Re-Encrypted PHR in cloud computing with Auditing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 6, page no. pp988-991, June-2020, Available at : http://www.jetir.org/papers/JETIR2006138.pdf

Publication Details

Published Paper ID: JETIR2006138
Registration ID: 234073
Published In: Volume 7 | Issue 6 | Year June-2020
DOI (Digital Object Identifier):
Page No: 988-991
ISSN Number: 2349-5162

Download Paper

Preview Article

Download Paper




Cite This Article

"Securely Sharing Re-Encrypted PHR in cloud computing with Auditing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 6, page no. pp988-991, June-2020, Available at : http://www.jetir.org/papers/JETIR2006138.pdf




Preview This Article


Downlaod

Click here for Article Preview