2022
DOI: 10.1155/2022/8685273
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Blockchain Based Data Access with Modified Hierarchical Attribute Access Structure with CP-ABE Using ECC Scheme for Patient Health Record

Abstract: Secure patient health record (PHR) information exchange via cloud computing is a considerable security risk to user privacy. The fundamental reason of this issue is cloud computing’s reliance on trustworthy third parties to share data across it. To exchange data securely, many conventional cryptographic algorithms employ various keying approaches. However, relying on a trusted third party compromises the privacy of consumers’ data. To offer secure communication without the involvement of a third party, a distr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 44 publications
(62 reference statements)
0
6
0
Order By: Relevance
“…The worse performance, than traditional ECQV certificate scheme. [30] cloud storage access control method access control with malicious cloud users' dependent on semi-trusted party [6] CP-ABE Using ECC Scheme effective key generation affects the ciphertext length with increase attributes [17] key-escrow-free ECCbased CP-ABE…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The worse performance, than traditional ECQV certificate scheme. [30] cloud storage access control method access control with malicious cloud users' dependent on semi-trusted party [6] CP-ABE Using ECC Scheme effective key generation affects the ciphertext length with increase attributes [17] key-escrow-free ECCbased CP-ABE…”
Section: Methodsmentioning
confidence: 99%
“…The main objective is to design a lightweight CP-ABE scheme for the IoT healthcare system. CP-ABE enables a user to encrypt data using attribute-based encryption without having to be aware of the specific individuals who make up each attribute [6]. The binary value valid, with a value of 1 for valid policies and a value of 0 for invalid policies, establishes the legality of the policy.…”
Section: Ecc Based Cp-abementioning
confidence: 99%
See 1 more Smart Citation
“…Yang et al [22] applied attribute-based encryption method with Computer-aided Design (CAD) of assembly model, which can protect the content privacy of CAD model and realize hierarchical access control of collaborative design scenes in cloud manufacturing. Sammy et al [23]'s scheme uses the elliptic curve cryptography, which can help reduce complexity. Besides, they provide dynamic attributes and a user-centric access policy, allowing multiple authorities to manage the attributes and realize data and user authentication.…”
Section: • Hierarchical Abementioning
confidence: 99%
“…We chose a symmetric-based fine-grained encryption algorithm to deal with massive files compared with the research based on public key encryption. Attribute-based encryption (ABE) is a derivation of public key encryption, such as schemes based on elliptic curve cryptography (ECC) [17,43,44] or the RSA algorithm [45,46]. Their key lengths are different at the same security level according to the National Institute of Standards and Technology (NIST) [47]; for example, a 112-bit symmetrical encryption key has the same strength as a 2048-bit RSA key or a 224-bit ECC key, and thus our strategy is better than others in terms of security and key length.…”
Section: Advantage Analysismentioning
confidence: 99%