Professional Documents
Culture Documents
P.VENKATESWAR RAO2
ABSTRACT
This project is to design and implement personal health record (PHR) and provide security and
stored in cloud provider. This application allows user to access their lifetime health information, it
maintained in centralized server to maintain the patients personal and diagnosis information. The
person health records should maintain with high privacy and security. The patient data is protected
from the public access through these security techniques. To convince the patients access over to
their own PHRs, before outsourcing we have to encrypt the PHRs. To protect the personal health
data stored in a partly-trusted server, we have to adopt attribute-based encryption (ABE) as a main
encryption primitive. To obtain fine-grained and scalable information access control for PHRs and
to encrypt each patients PHR file we purchase attribute based encryption (ABE) techniques. In this
project we propose a new patient centric Architecture and access mechanism to control PHRs in
multitrusted servers. We get fine grained and scalable control of data access for personal health
records stored in multi-trusted servers, and attributes based encryption (ABE) technique to encrypt
the each patients medical record into a file. In this paper we are extend Multi Authority Attribute
Based Encryption (MA-ABE) for access control mechanism.
Keywords: Personal Health Records, Cloud Computing, Data Privacy, Fine-grained access
control, Multi Authority Attribute Based Encryption.
1. INTRODUCTION
In Recent years, personal health record is
maintained as a patient centric design of health
message exchange. It allows a patient to create
and control their medical data and it can be
maintained in a single place such as data
centres. High cost of building and managing
stream of data centres and many of PHR
services are outsourced to third party service
providers, for example Google Health,
172
www.iaetsd.in
B. Revocable
Encryption:
Attributed
based
2. RELATED WORK
This article is more related to operate in
cryptographically enforced control access for
outsourced data and attribute based on
encryption data. To improve the scalability of
the above result, one-to-many encryption
methods such as ABE can be utilized. The
basic property of ABE is preventing against
the user collusion.
3. IMPLEMENTATION
a. Requirements:
The most important task is to achieve patientcentric PHR sharing. That means, the patient
should contain the fundamental control over
their own health record. It also determines
which users should have access to their
medical data. The user control write/read
access and revocation are two main security
purposes for any type of electronic health
record system. The write access control is
controlled by the person to prevent in PHR
A.Trusted Authority:
Multiple operations used ABE to realize fine
grained access outsourced data control. Each
patient EHR files are encrypted by using a
broadcast variant of CP-ABE that allows
directly. Here several communication
drawbacks of the above mentioned
operations. Mainly they are usually
pretending the use of a single trusted authority
173
www.iaetsd.in
b. Framework:
The purpose of our framework is to provide
security of patient-centric PHR access and
efficient key management at the same time. If
users attribute is not valid, then the user is
unable to access future PHR files using that
attribute. The PHR data should support users
from the personal domain as well as public
domain. The public domain may have more
number of users who may be in huge amount
and unpredictable, system should be highly
scalable in terms of complexity in key
management
system
communication,
computation and storage.
The owners
endeavour in managing users and keys should
be minimized to enjoy usability. By using
attribute based encryption we can encrypt
personal health records self-protective that is
they can access only authorized users even on
a semi trusted server.
c. Architecture of implementation:
174
of
patients
medical
www.iaetsd.in
4. TECHNIQUES
a. Attribute Based Encryption
b. Multi-Authority ABE
ii.
User
Access
Confidentiality:
Privilege
175
www.iaetsd.in
6. CONCLUSION
This PHR system fights against the security
attackers and hackers. The secure data sharing
is used to protect the information from
unauthorized user. We have proposed a novel
approach for existing PHR system providing
high security using Attribute Based
Encryption which plays main role, because
these are the unique competition, and it is
difficult to hack. The ABE model increases
and operates with MAABE.
7. REFERENCES
[9] S. Narayan, M. Gagne, and R. SafaviNaini, Privacy preserving EHR system using
attribute-based infrastructure, ser. CCSW
10, 2010, pp. 4752.
176
www.iaetsd.in
177
www.iaetsd.in