ATTRIBUTE BASED ENCRYPTION FOR SECURE SHARING OF E-HEALTH DATA
DOI:
https://doie.org/10.5281/5wvmrs22Keywords:
Attribute based encryption for secure sharing of E-health data,,Abstract
In recent years, there has been a tremendous expansion of distributed computing. A
lot of data are sent over the internet and stored on open cloud servers that are located in faraway
locations. These servers cannot be relied on completely by customers, which is particularly
problematic considering that an ever-increasing number of businesses may need to manage
their data with the assistance of cloud servers. However, when the data that are re-appropriated
in the cloud are unstable, the issues of security and assurance end up constricting the overall
game plan for cloud-based frameworks. The purpose of this work is to provide a plan for the
secure sharing of data in order to safeguard the safety of data proprietors and address the
security concerns associated with information sharing. The examinations of both the set upend
plan's security and productivity demonstrate that it is viable and efficient to implement. In the
last part of this article, we will discuss its potential applications in electronic health records.
Many hospitals and other medical facilities have difficulty adopting cloud-based Electronic
Health Record (EHR) systems because of the potential for data breaches and the subsequent
loss of patient information that would arise from such a breach. When it comes to the adoption
of electronic health records in the healthcare business, the most important barrier to entry is the
patient's right to privacy as well as the protection of their information from unauthorized access.
As a result, there is an urgent need for the development of an appropriate system for the
administration of cloud-based EHR Services that are safe, secure, and simple to use. A secure
cloud-based electronic health record storage system is offered in this article as a solution to the
aforementioned issues. According to this system, a patient's information will be encrypted and
stored on a cloud server in a safe manner using the attribute-based encryption (ABE) method.
References
Wing P, Langelier M, Continelli T, and Armstrong D. The HIM workforce and workplace - 2002- member survey data for decisions. 2003 edition published in Chicago by the American
Health Information Management Association.
According to Sittig DF and Singh H. Defining health information technology and associated
errors: New advancements made after the publication of To Err Is Human. 2011;
(14):1281–4 from Arch Internal Medicine.
K. Hayrinen, K. Saranto, and P. Nyk'anen, "Definition, structure, content, use, and impacts
of electronic health records: a review of the research literature," published in the International
journal of medical informatics, volume 77, issue 5, pages 291–304, in the year 2008.
Nima Mirani, Hamid Ayatollahi, and Hamid Haghani. An investigation of the challenges
confronting Iran's efforts to create and use electronic health records. Journal of Health
Administration, Volume 50, Issue 15 (2017), Page 3.
Buyya R., Yeo C.S., Venugopal S., Broberg J., and Brandic I.
The concept, the hype, and the reality of offering computing as the fifth utility are discussed in
relation to cloud computing and developing IT platforms.
Future Generation computer systems, 2009, volume 25, number 6, pages 599-616.
Kanagaraj G, Sumathi AC. [Transcription]. A proposal for an open-source cloud computing
system to facilitate the transfer of medical pictures inside a hospital information system. In
Trends in Information Sciences and Computing (TISC), IEEE's Third International
Conference, 2011, Pages 144–9.
The Department of Health and Human Services of the United States of America.
Privacy of Patient Health Information, 2011.
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina are referred
to in reference number 8. Keeping tabs on your data while it's stored in the cloud requires you
to outsource compute but not control. In the Proceedings of the 2009 ACM workshop on Cloud
Computing Security, it was abbreviated as CCSW '09 in 2009.
M. Joshi, S. Mittal, K. P. Joshi, and T. Finin wrote an article titled "Semantically rich,
oblivious access control using abac for secure cloud storage," which was published in Edge
Computing (EDGE), 2017 IEEE International Conference on. IEEE, 2017, pages 142–149.
W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: Vision and challenges,"
published in the IEEE Internet of Things Journal, volume 3, number 5, pages 637–646, 2016.
In the proceedings of the thirteenth annual ACM conference on computer and
communications security is a paper titled "Attribute-based encryption for fine-grained access
control of encrypted data." This paper was written by V. Goyal, O. Pandey, A. Sahai, and B.
Waters.
The ACM, 2006, pages 89–98.