Skip to main content

Intelligent Attribute Based Encryption (IABE) Mechanism for Health Records in Cloud

  • Conference paper
  • First Online:
Computing, Communication and Signal Processing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 810))

  • 1561 Accesses

Abstract

Various possible definitions are to be found in appropriated figuring. A vast bit of them focuses on the development in a manner of speaking. Research has been done to merge all these particular definitions to come up with one uniform definition. Conveyed processing can best be depicted as a mammoth pool which contains gear, programming and diverse organizations that can be gotten to through the “cloud”. Each one of these advantages can be gotten to at whatever point generally. A significant part of the time the provider of the cloud offers his organization as pay-per-use. This infers there is high versatility in the use of these organizations as extra resources are always available. Moving fragile data from in-house IT system to a cloud arrange has transformed into a mind-boggling and testing undertaking. This paper proposes another protected technique to secure customer fragile data. In this methodology, we are considering therapeutic administrations data. We are using multilevel quality based encryption plot for securing customer’s wellbeing records. The trial comes to fruition demonstrate ideal results over existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)

    Article  Google Scholar 

  2. Hine, J.H., Yao, W., Bacon, J., Moody, K.: An architecture for distributed OASIS services. In: Proceedings of International Conference on Distributed Systems Platforms and Open Distributed Processing, vol. 1795, pp. 104–120. Springer, Apr 2000

    Google Scholar 

  3. Eyers, D., Bacon, J., Moody, K.: OASIS role-based access control for electronic health records. In: IEEE Proceedings—Software, vol. 153, pp. 16–23 (2006)

    Article  Google Scholar 

  4. Jin, J., Ahn, G.-J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for sharing electronic health records. In: Proceedings of 14th ACM Symposium on Access Control Models and Technologies, pp. 125–134. ACM (2009)

    Google Scholar 

  5. Jin, J., Ahn, G.-J., Covington, M.J., Zhang, X.: Toward an access control model for sharing composite electronic health records. In: Proceedings of 4th International Conference on Collaborative Computing, Nov 2008

    Google Scholar 

  6. Coiera, E., Clarke, R.: e-Consent: the design and implementation of consumer consent mechanisms in an electronic environment. J. Am. Med. Inform. Assoc. 11(2), 129–140 (2004)

    Article  Google Scholar 

  7. openEHR Foundation: openEHR: an open domain-driven platform for developing flexible e-health systems

    Google Scholar 

  8. Reddy, L.V., Kumar, N.S.: Multi layer encryption using access control in public clouds. i-Managers’ J. Cloud Comput. 2(1), 24–31 (2015)

    Google Scholar 

  9. Ranjith, Venkateswara Reddy, L.: Threats –Solutions in Cloud security, Recent and Innovation Trends in Computing and Communication (IJRITCC)

    Google Scholar 

  10. Ranjith, Venkateswara Reddy, L.: An improved cryptographic mechanism for cloud storage system. Int. J. Appl. Eng. Res. (Accepted for its publication)

    Google Scholar 

  11. Perry Groot, M.O., Bruijsten, F.: Patient data confidentiality issues of the dutch electronic health care record. In: Proceedings of the 19th Belgian-Dutch Conference on Artificial Intelligence (BNAIC), pp. 151–157 (2007)

    Google Scholar 

  12. Salih, R.M., Lilien, L., Othmane, L.B.: Protecting patients electronic health records using enhanced active bundles. In: Proceedings of the 6th International Conference on Pervasive Computing Technologies for Healthcare, Doctoral Consortium, pp. 1–4 (2012)

    Google Scholar 

  13. Ben Othmane, L.: Active bundles for protecting confidentiality of sensitive data throughout their lifecycle. Ph.D. dissertation, Kalamazoo, MI, USA, aAI3441001 (2010)

    Google Scholar 

  14. Ranchal, R.: Cross-domain data dissemination and policy enforcement. Ph.D. dissertation, West Lafayette, IN, USA (2015)

    Google Scholar 

  15. Moore, P.L.: Taming the beast. 2006/2007 physicians practice technology guide. Physicians Practice, pp. 7–10 (2006)

    Google Scholar 

  16. Amazon, E.C.: Amazon Web Services EC2 instance types. http://aws.amazon.com/ec2/instance-types/ (2014). Accessed 10 Feb 2017, Accessed 21 Nov 2016

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ranjith Kumar Vollala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vollala, R.K., Venkateswara Reddy, L. (2019). Intelligent Attribute Based Encryption (IABE) Mechanism for Health Records in Cloud. In: Iyer, B., Nalbalwar, S., Pathak, N. (eds) Computing, Communication and Signal Processing . Advances in Intelligent Systems and Computing, vol 810. Springer, Singapore. https://doi.org/10.1007/978-981-13-1513-8_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1513-8_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1512-1

  • Online ISBN: 978-981-13-1513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics