IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 3- Issue 4, April 2014 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Survey Of Management Of PHR By Secure Cipher Text Policy Attribute Based Encryption Scheme

[Full Text]

 

AUTHOR(S)

Abel Joy, Akhila H, Annie Chacko

 

KEYWORDS

Index Terms: Cipher text Policy Attribute Based Encryption, Identity Based Encryption, Public Key Infrastructure,Personal Health Record Trusted Third Part

 

ABSTRACT

Abstract: The PHR enables patients to manage their medical records in a centralized way which greatly facilitate the storage, access and sharing of personal health data. These details are locked by a central server in the hospital. But the security over the data is loosed while the data is sent to a requester. In this paper, we describe a new scheme for the secure data handling. The CP-ABE scheme is used for this purpose. In this scheme each userís private key is associated with set of attribute representing these capabilities and an encrypted cipher text such that only users whose attribute satisfy a certain policy can decrypt.

 

REFERENCES

[1]. Amit Sahai UCLA CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION, John Bethencourt Carnegie Mellon University,Brent Waters, SRI International.

[2]. Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker,EFFICIENT AND PROVABLE SECURE CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION SCHEMES, Faculty of EWI, University of Twente, the Netherlands, Philips Research, the Netherla

[3]. Xiaohui Liang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, CIPHERTEXT POLICY ATTRIBUTE BASED ENCRYPTION WITH POLICY ATTRIBUTE BASED ENCRYPTION WITH EFFICIENT REVOCATION, Department of Electrical and Computer Engineering, University of Waterloo,Canada Faculty of Business and Information Technology, University of Ontario Institute of Technology, Canada

[4]. Vipul Goyal, Abhishek Jain, Omkant Pandey, and Amit Sahai, BOUNDED CIPHER TEXT POLICY ATTRIBUTE BASED ENCRYPTION, Department of Computer Science,UCLA