Open Access Open Access  Restricted Access Subscription or Fee Access

Securing IWR in Cloud Using Various Trait Based Encryption Methods

F. Antony Xavier Bronson, S.P. Rajagopalan

Abstract


Individual wellbeing record (IWR) is a rising pattern in the wellbeing field for the trade and utilization of individual wellbeing data. This record is currently a day's put away in the outsider stockpiling ranges like in the cloud suppliers. To lessen the storage room required and for the expense diminishment, the cloud administration connected. There are loads of security issues related with the capacity of delicate individual wellbeing data in the mists. The security and privacy of individual wellbeing data have challenges when cloud storage and applications utilized. Here the propelled encryption systems like trait based encryption and its varieties are utilized. Secure offering of individual wellbeing record is guaranteed in this framework.


Keywords


Trait Based Encryption (TBE), Cloud Storage, Security, Cloud Information Security, Individual Wellbeing Record (IWR).

Full Text:

PDF

References


M. Li, S. Yu, K. Ren, and W. Lou, “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings,” Proc. Sixth Int’lICST Conf. Security and Privacy in Comm. Networks (SecureComm ’10), pp. 89-106, Sept. 2010.

L. Ibraimi, M. Asim, and M. Petkovic, “Secure Management of Personal Health Records by Applying Attribute-Based Encryption,” technical report, Univ. of Twente, 2009.

S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,” Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS ’10), 2010.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. 13th ACM Conf. Computer and Comm. Security (CCS ’06), pp. 89-98, 2006.

S. Narayan, M. Gagne´, and R. Safavi-Naini, “Privacy Preserving EHR System Using Attribute-Based Infrastructure,” Proc. ACM Cloud Computing Security Workshop (CCSW’10), pp. 47-52, 2010.

S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing,” Proc. IEEE INFOCOM ’10, 2010.

M. Chase and S.S. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS ’09), pp. 121-130, 2009.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy (SP ’07), pp. 321-334, 2007.

L. Ibraimi, Q. Tang, P. Hartel and W. Jonker, “Efficient and provable secure ciphertext-policy attribute-based encryption schemes,” LectureNotes in Computer Science. Berlin, Germany: Springer, pp.1-12, vol.5451, 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.