UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 6
June-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1908024


Registration ID:
224073

Page Number

158-162

Share This Article


Jetir RMS

Title

Efficient and secure Re-encryption PHR Sharing with time server in cloud

Abstract

In the health care sector has resulted in price effective and convenient exchange of personal Health Records (PHRs) among several collaborating entities of the e-Health systems. Still, storing the confidential health information to cloud servers is vulnerable to revelation or stealing and demand the event of methodologies that make certain the privacy of the PHRs. Therefore, we have a tendency to tend to propose a way cited as Sash for secure sharing of the PHRs among the cloud. The Sash theme ensures patient-centric management on the PHRs and preserves the confidentiality of the PHRs. The patients store the encrypted PHRs on the un-trusted cloud servers and selectively grant access to differing kinds of users on whole totally different components of the PHRs. A semi-trusted proxy cited as Setup and Re-encryption Server (SRS) is introduced to line up the public/private key pairs and to provide the re-encryption keys. Moreover, the methodology is secure against executive director threats and put together enforces a forward and backward access management. Moreover, we have a tendency to tend to formally analyze and verify the in operation of Sash methodology through the High Level Petri Nets (HLPN). Performance analysis regarding time consumption indicates that the Sash methodology has potential to use for firmly sharing the PHRs among the cloud. put together we have a tendency to tend to Implement as a contribution throughout this paper time Server, Secure Auditing Storage, in Time Server PHR Owner add the beginning and Ending time attach to uploaded Encrypted files, and put together implement the TPA Module for verify the PHR Record its hack or corrupted for the opposite hacker and bad person if data hack from hacker side discover all system details of bad person like Macintosh Address and knowledge science Address its our contribution in our project.

Key Words

Access control, cloud computing, Personal Health Records, privacy, Time Server, Auditing, Proxy Server

Cite This Article

"Efficient and secure Re-encryption PHR Sharing with time server in cloud", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 6, page no.158-162, June 2019, Available :http://www.jetir.org/papers/JETIR1908024.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Efficient and secure Re-encryption PHR Sharing with time server in cloud", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 6, page no. pp158-162, June 2019, Available at : http://www.jetir.org/papers/JETIR1908024.pdf

Publication Details

Published Paper ID: JETIR1908024
Registration ID: 224073
Published In: Volume 6 | Issue 6 | Year June-2019
DOI (Digital Object Identifier):
Page No: 158-162
Country: Pune, Maharashtra, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002801

Print This Page

Current Call For Paper

Jetir RMS