Developing An Effective Cryptosystem For Secure Management Of Healthcare Data In Cloud Environment
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
The main challenge in the public health record management system is not only to preserve the health-related data. There is a need to be the best security practice to safeguard it and also for accessing the data in the future, whenever required to maintain an appropriate technique for accepting and safeguarding patient records. The protection, exchange and access to different algorithms are used for this medical information in order to encrypt the data in a secure and efficient way. Since sensitivity is more necessary for patient information, it is privileged to maintain the purposes of safety and should be accessible by doctors. The doctor is provided with the created encryption key. Encrypting the data by over- searching is a complicated disadvantage.
newline
newlineThe primary objective of this work is to store the data automatically and to be accessible via a continuous data acceleration process. Though finding the vulnerabilities is a complex one, it is easy to determine the fault tolerance in the sharing and storing of information in this study to help a continuous connection that allows data, access data and the data to be stored in the appropriate file to be easily retrieved. Sometimes, as the data is processed and recovered, it gets detached and begins to crash. The collection of data for manipulation on any untrusted servers is used to prevent this fine-grained attribute. Data passwords are downloaded or uploaded in order to encrypt the Information Attribute Based Encryption (ABE) technique.
newline
newline
newlineThe first contribution is the mechanism of attribute-based encryption in the closed sharing by the health data. The ownership of the privacy is done by encrypting the PHR files and allowing fine grained control of access by understanding the definition of patient. The patients are allowed to access the PHR data to the various clients of public domain
newline
newline
newline
newlinefor attaining the correct credentials. The second contribution is the storing of AES series rules which is to be found missing in the existing systems. An AES algorithm is being