2017
DOI: 10.22266/ijies2017.1031.04
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced ABE based Secure Access Control Scheme for E-health Clouds

Abstract: Abstract:The E-health clouds generate an enormous amount of data driven from PHR's, EHR's, EMR's, patient care, compliance and regulatory requirements. To preserve the privacy and confidentiality of the e-health data at untrusted servers various solutions on symmetric key-based access control has aroused. But the major drawback of these techniques is that it is patient centric and do not provide security and fine-grained access control. To solve these issues the paper defines a secure access control scheme for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…In 2017, Shynu et al [51] proposed an e-health cloud storage system to handle multiple users for sensitive data sharing. The system consists of four major entities: CS, key management centre (KMC), DO, data user (DU), a nonpatient-centric approach adopted in which the health service provider (HSP) plays the role of DO.…”
Section: E-healthcarementioning
confidence: 99%
See 3 more Smart Citations
“…In 2017, Shynu et al [51] proposed an e-health cloud storage system to handle multiple users for sensitive data sharing. The system consists of four major entities: CS, key management centre (KMC), DO, data user (DU), a nonpatient-centric approach adopted in which the health service provider (HSP) plays the role of DO.…”
Section: E-healthcarementioning
confidence: 99%
“…The average time for health data request is assumed (m HC , m BS , or m D ) with X.509 certificate with 8192 bits and with 245760 bits. The treatment phase, with 1,230,316 bits as 3G telecommunication cost is 2Mbps/384 kbps/144 kbps, is evaluated and as the worst in terms of communication cost while, in the simulation of experiments in the ABE scheme [51], the computation time for encryption process is 28ms (milliseconds), quite low compared to other existing techniques (39ms). However, a complexity comparison with traditional encryption schemes [46] and the timing cost of operations used in ESPAC [42], evaluated by varying number of attributes [42], are commonly used to calculate time and cost complexity.…”
Section: Performance Estimationmentioning
confidence: 99%
See 2 more Smart Citations
“…User revocation process is made by revoking user's attributes from the cipher-text itself, which makes revoked user's attribute removed from the list of users who can access and decrypt that file. Additionally, a method called the rekeying mechanism was proposed by authors of [21]. This method achieves revocation via a key update, in which if a user (i.e., Nurse) is revoked from the system, the key updated for other users' while keeping the revoked user key without an update.…”
Section: A Related Workmentioning
confidence: 99%