UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 6
June-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2006138


Registration ID:
234073

Page Number

988-991

Share This Article


Jetir RMS

Title

Securely Sharing Re-Encrypted PHR in cloud computing with Auditing

Abstract

In the health care sector has resulted in price effective and convenient exchange of private Health Records (PHRs) among several collaborating entities of the e-Health systems. Therefore, we've a bent to tend to propose how cited as SeSPHR for secure sharing of the PHRs among the cloud. The SeSPHR theme ensures patient-centric management on the PHRs and preserves the confidentiality of the PHRs. The patients store the encrypted PHRs on the un-trusted cloud servers and selectively grant access to differing types of users on whole totally different components of the PHRs. A semi-trusted proxy cited as Setup and Re-encryption Server (SRS) is introduced to line up the public/private key pairs and to supply the re-encryption keys. Moreover, the methodology is secure against executive threats and put together enforces a forward and backward access management. Moreover, we've a bent to tend to formally analyze and verify the operational of SeSPHR methodology through the High Level Petri Nets (HLPN). Performance analysis regarding time consumption indicates that the SeSPHR methodology has potential to use for firmly sharing the PHRs among the cloud. put together we've a bent to tend to Implement as a contribution throughout this paper time Server, Secure Auditing Storage, in Time Server PHR Owner add the start and Ending time attach to uploaded Encrypted files, and put together implement the TPA Module for verify the PHR Record its hack or corrupted for the other hacker and person if data hack from hacker side discover all system details of person like Macintosh Address and knowledge science Address its our contribution in our project.

Key Words

Access control, cloud computing, Personal Health Records, privacy, Time Server, Auditing, Proxy Server.

Cite This Article

"Securely Sharing Re-Encrypted PHR in cloud computing with Auditing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 6, page no.988-991, June-2020, Available :http://www.jetir.org/papers/JETIR2006138.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Securely Sharing Re-Encrypted PHR in cloud computing with Auditing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 6, page no. pp988-991, June-2020, Available at : http://www.jetir.org/papers/JETIR2006138.pdf

Publication Details

Published Paper ID: JETIR2006138
Registration ID: 234073
Published In: Volume 7 | Issue 6 | Year June-2020
DOI (Digital Object Identifier):
Page No: 988-991
Country: Akurdi Pune, MH, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003019

Print This Page

Current Call For Paper

Jetir RMS