Abstract
Various possible definitions are to be found in appropriated figuring. A vast bit of them focuses on the development in a manner of speaking. Research has been done to merge all these particular definitions to come up with one uniform definition. Conveyed processing can best be depicted as a mammoth pool which contains gear, programming and diverse organizations that can be gotten to through the “cloud”. Each one of these advantages can be gotten to at whatever point generally. A significant part of the time the provider of the cloud offers his organization as pay-per-use. This infers there is high versatility in the use of these organizations as extra resources are always available. Moving fragile data from in-house IT system to a cloud arrange has transformed into a mind-boggling and testing undertaking. This paper proposes another protected technique to secure customer fragile data. In this methodology, we are considering therapeutic administrations data. We are using multilevel quality based encryption plot for securing customer’s wellbeing records. The trial comes to fruition demonstrate ideal results over existing techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)
Hine, J.H., Yao, W., Bacon, J., Moody, K.: An architecture for distributed OASIS services. In: Proceedings of International Conference on Distributed Systems Platforms and Open Distributed Processing, vol. 1795, pp. 104–120. Springer, Apr 2000
Eyers, D., Bacon, J., Moody, K.: OASIS role-based access control for electronic health records. In: IEEE Proceedings—Software, vol. 153, pp. 16–23 (2006)
Jin, J., Ahn, G.-J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for sharing electronic health records. In: Proceedings of 14th ACM Symposium on Access Control Models and Technologies, pp. 125–134. ACM (2009)
Jin, J., Ahn, G.-J., Covington, M.J., Zhang, X.: Toward an access control model for sharing composite electronic health records. In: Proceedings of 4th International Conference on Collaborative Computing, Nov 2008
Coiera, E., Clarke, R.: e-Consent: the design and implementation of consumer consent mechanisms in an electronic environment. J. Am. Med. Inform. Assoc. 11(2), 129–140 (2004)
openEHR Foundation: openEHR: an open domain-driven platform for developing flexible e-health systems
Reddy, L.V., Kumar, N.S.: Multi layer encryption using access control in public clouds. i-Managers’ J. Cloud Comput. 2(1), 24–31 (2015)
Ranjith, Venkateswara Reddy, L.: Threats –Solutions in Cloud security, Recent and Innovation Trends in Computing and Communication (IJRITCC)
Ranjith, Venkateswara Reddy, L.: An improved cryptographic mechanism for cloud storage system. Int. J. Appl. Eng. Res. (Accepted for its publication)
Perry Groot, M.O., Bruijsten, F.: Patient data confidentiality issues of the dutch electronic health care record. In: Proceedings of the 19th Belgian-Dutch Conference on Artificial Intelligence (BNAIC), pp. 151–157 (2007)
Salih, R.M., Lilien, L., Othmane, L.B.: Protecting patients electronic health records using enhanced active bundles. In: Proceedings of the 6th International Conference on Pervasive Computing Technologies for Healthcare, Doctoral Consortium, pp. 1–4 (2012)
Ben Othmane, L.: Active bundles for protecting confidentiality of sensitive data throughout their lifecycle. Ph.D. dissertation, Kalamazoo, MI, USA, aAI3441001 (2010)
Ranchal, R.: Cross-domain data dissemination and policy enforcement. Ph.D. dissertation, West Lafayette, IN, USA (2015)
Moore, P.L.: Taming the beast. 2006/2007 physicians practice technology guide. Physicians Practice, pp. 7–10 (2006)
Amazon, E.C.: Amazon Web Services EC2 instance types. http://aws.amazon.com/ec2/instance-types/ (2014). Accessed 10 Feb 2017, Accessed 21 Nov 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Vollala, R.K., Venkateswara Reddy, L. (2019). Intelligent Attribute Based Encryption (IABE) Mechanism for Health Records in Cloud. In: Iyer, B., Nalbalwar, S., Pathak, N. (eds) Computing, Communication and Signal Processing . Advances in Intelligent Systems and Computing, vol 810. Springer, Singapore. https://doi.org/10.1007/978-981-13-1513-8_21
Download citation
DOI: https://doi.org/10.1007/978-981-13-1513-8_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1512-1
Online ISBN: 978-981-13-1513-8
eBook Packages: EngineeringEngineering (R0)