ATTRIBUTE BASED ENCRYPTION FOR SECURE SHARING OF E-HEALTH DATA

Authors

  • Rohini Author
  • Prof. Sunil Sangme Author

DOI:

https://doie.org/10.5281/5wvmrs22

Keywords:

Attribute based encryption for secure sharing of E-health data,,

Abstract

In recent years, there has been a tremendous expansion of distributed computing. A 
lot of data are sent over the internet and stored on open cloud servers that are located in faraway 
locations. These servers cannot be relied on completely by customers, which is particularly 
problematic considering that an ever-increasing number of businesses may need to manage 
their data with the assistance of cloud servers. However, when the data that are re-appropriated 
in the cloud are unstable, the issues of security and assurance end up constricting the overall 
game plan for cloud-based frameworks. The purpose of this work is to provide a plan for the 
secure sharing of data in order to safeguard the safety of data proprietors and address the 
security concerns associated with information sharing. The examinations of both the set upend 
plan's security and productivity demonstrate that it is viable and efficient to implement. In the 
last part of this article, we will discuss its potential applications in electronic health records. 
Many hospitals and other medical facilities have difficulty adopting cloud-based Electronic 
Health Record (EHR) systems because of the potential for data breaches and the subsequent 
loss of patient information that would arise from such a breach. When it comes to the adoption 
of electronic health records in the healthcare business, the most important barrier to entry is the 
patient's right to privacy as well as the protection of their information from unauthorized access. 
As a result, there is an urgent need for the development of an appropriate system for the 
administration of cloud-based EHR Services that are safe, secure, and simple to use. A secure 
cloud-based electronic health record storage system is offered in this article as a solution to the 
aforementioned issues. According to this system, a patient's information will be encrypted and 
stored on a cloud server in a safe manner using the attribute-based encryption (ABE) method.

,

References

Wing P, Langelier M, Continelli T, and Armstrong D. The HIM workforce and workplace - 2002- member survey data for decisions. 2003 edition published in Chicago by the American

Health Information Management Association.

According to Sittig DF and Singh H. Defining health information technology and associated

errors: New advancements made after the publication of To Err Is Human. 2011;

(14):1281–4 from Arch Internal Medicine.

K. Hayrinen, K. Saranto, and P. Nyk'anen, "Definition, structure, content, use, and impacts

of electronic health records: a review of the research literature," published in the International

journal of medical informatics, volume 77, issue 5, pages 291–304, in the year 2008.

Nima Mirani, Hamid Ayatollahi, and Hamid Haghani. An investigation of the challenges

confronting Iran's efforts to create and use electronic health records. Journal of Health

Administration, Volume 50, Issue 15 (2017), Page 3.

Buyya R., Yeo C.S., Venugopal S., Broberg J., and Brandic I.

The concept, the hype, and the reality of offering computing as the fifth utility are discussed in

relation to cloud computing and developing IT platforms.

Future Generation computer systems, 2009, volume 25, number 6, pages 599-616.

Kanagaraj G, Sumathi AC. [Transcription]. A proposal for an open-source cloud computing

system to facilitate the transfer of medical pictures inside a hospital information system. In

Trends in Information Sciences and Computing (TISC), IEEE's Third International

Conference, 2011, Pages 144–9.

The Department of Health and Human Services of the United States of America.

Privacy of Patient Health Information, 2011.

R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina are referred

to in reference number 8. Keeping tabs on your data while it's stored in the cloud requires you

to outsource compute but not control. In the Proceedings of the 2009 ACM workshop on Cloud

Computing Security, it was abbreviated as CCSW '09 in 2009.

M. Joshi, S. Mittal, K. P. Joshi, and T. Finin wrote an article titled "Semantically rich,

oblivious access control using abac for secure cloud storage," which was published in Edge

Computing (EDGE), 2017 IEEE International Conference on. IEEE, 2017, pages 142–149.

W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: Vision and challenges,"

published in the IEEE Internet of Things Journal, volume 3, number 5, pages 637–646, 2016.

In the proceedings of the thirteenth annual ACM conference on computer and

communications security is a paper titled "Attribute-based encryption for fine-grained access

control of encrypted data." This paper was written by V. Goyal, O. Pandey, A. Sahai, and B.

Waters.

The ACM, 2006, pages 89–98.

Published

2023-03-08

Issue

Section

Articles

How to Cite

ATTRIBUTE BASED ENCRYPTION FOR SECURE SHARING OF E-HEALTH DATA . (2023). Phoenix: International Multidisciplinary Research Journal ( Peer Reviewed High Impact Journal ), 1(2), 96-103. https://doi.org/10.5281/5wvmrs22