UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 4
April-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2004475


Registration ID:
231008

Page Number

2008-2012

Share This Article


Jetir RMS

Title

A Survey on Auditing the Re-Encrypted Patients Health Records and Sharing with users on Cloud

Abstract

The health care industry has a significant advantage of storing and exchanging of Patient’s Health Records (PHRs) using cloud technology among various entities of the Health system. But still, to preserve the confidential records of patients on the cloud servers, it is permeable to afflatus and increment of request the event that methodologies make absolute privacy of the PHR. Therefore, we have the propensity to bend the proposed path mentioned as SeSPHR for the secure access of PHR’s inside the cloud. The SeSPHR gives security to the patient-centered management of the PHR’s and saves its furtiveness. Due to this, the patients can keep their encrypted data on an untrusted cloud server and share it with different selective users. For encryption and Re-encryption, the Public, as well as Private access key, is used. Moreover, this security technique secures averse executive director bluster and keeps it together to apply for backward and forward access. In addition to this, we have the propensity to bend formally explore and verify the operation of the SeSPHR technique through the HLPN. The time consumption performance analysis for the SeSPHR technique has the potential to use for sturdily sharing of the PHR’s on a different cloud. Put together, and we have the propensity to bend to implement as a contribution of this entire paper, time-bound and secure storage. In time-bound, the owner comes into the picture in starting and ending time after that attach and upload the encrypted files. And after all of that process, the TPA model is used to verify the PHR record, i.e., it checks if the data is hacked or corrupted. TPA also use to find out all details of a hacker if the PHR report is hacked, i.e. the contribution of TPA.

Key Words

Access Control, Cloud Computing, Patients Health Records, Privacy, Proxy Server, Third Party Auditing

Cite This Article

"A Survey on Auditing the Re-Encrypted Patients Health Records and Sharing with users on Cloud", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 4, page no.2008-2012, April-2020, Available :http://www.jetir.org/papers/JETIR2004475.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A Survey on Auditing the Re-Encrypted Patients Health Records and Sharing with users on Cloud", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 4, page no. pp2008-2012, April-2020, Available at : http://www.jetir.org/papers/JETIR2004475.pdf

Publication Details

Published Paper ID: JETIR2004475
Registration ID: 231008
Published In: Volume 7 | Issue 4 | Year April-2020
DOI (Digital Object Identifier):
Page No: 2008-2012
Country: Pune, Maharashtra, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003076

Print This Page

Current Call For Paper

Jetir RMS