2018 International Conference on Current Trends Towards Converging Technologies (ICCTCT) 2018
DOI: 10.1109/icctct.2018.8551006
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Sharing of Personal Health Records in Cloud Using Fine-Grained and Enhanced Attribute-Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…This method encrypts the medical record by integrating the tiered access structures into a single access structure. Selvam and Renjit 9 examined the fine‐grained enhanced ABE ability to securely access the data for medical records from various access points and share each patient's medical record file. To tackle the centralized storage difficulty, this paper provides a system that stores data utilizing a blockchain based data storage and access method.…”
Section: Literature Surveymentioning
confidence: 99%
“…This method encrypts the medical record by integrating the tiered access structures into a single access structure. Selvam and Renjit 9 examined the fine‐grained enhanced ABE ability to securely access the data for medical records from various access points and share each patient's medical record file. To tackle the centralized storage difficulty, this paper provides a system that stores data utilizing a blockchain based data storage and access method.…”
Section: Literature Surveymentioning
confidence: 99%
“…In [40], the authors have utilized multi-authority ABE (MAABE) where ABE is implemented with the division of users into domains, each domain having similar privileges that lead to reduce the difficulty with the key management. In [70], the authors used a fine-grained and enhanced MA-ABE (eMA-ABE) for the secure data sharing of P-HRs. this model ensures data confidentiality and user revocation on demand.…”
Section: Crypto Techniquesmentioning
confidence: 99%
“…key aggregate cryptosystem has been used for revocation of access control [12] . The authors [13] proposed the methodology is sesphr which can be used for securely hold on transmission of the private health records to the approved entities within the cloud storage. PHR owner storing the encrypted data on cloud storage and only authorized person can be access the valid re encryption keys provided by a semi trusted proxy can be decryption of PHR.…”
Section: Fig 2: Structure Of Phr In Cloudmentioning
confidence: 99%
“…The re-encryption keys and V are calculated below. (13) Here ᵡI and ᵡᴩ are the private keys of I and P.…”
Section: Fᵖ=[bᵡ]ᵖ[bpᵛ]ᵖ=[bq]ᵡmentioning
confidence: 99%