Efficient access control technique to maintain health records in cloud

Satya Sravani Chodavarapu, Sunil Nadella

Abstract


We propose a novel attribute based encryption scheme for fine-grained and adaptable access control to PHRs information in cloud computing. The plan creates shared information by the normal access subpolicy which depends on various patients' entrance arrangements. At that point the plan joins the encryption of PHRs from various patients. Hence, both time utilization of encryption and decryption can be diminished. Medical staff require changing dimensions of access to PHRs. The proposed plan can likewise bolster multi-benefit get to control with the goal that therapeutic staff can get to the required dimension of information while augmenting quiet security. Through usage and reenactment, we show that the proposed plan is effective regarding time. In addition, we demonstrate the security of the proposed plan dependent on security of the ciphertext-strategy attribute based encryption scheme.


References


J. McAuley and A. Yang, “Addressing complex and topicive product-related queries with customer reviews,” in WWW, 2016,pp. 625–635.

N. V. Nielsen, “E-commerce: Evolution or revolution in the fast moving consumer goods world,” nn group. com, 2014.

W. D. J. Salganik M J, Dodds P S, “Experimental study of inattribute and unpredictability in an artificial cultural market,” in ASONAM, 2016, pp. 529–532.

R. Peres, E. Muller, and V. Mahajan, “Innovation diffusion and new product growth models: A critical review and research directions,”International Journal of Research in Marketing, vol. 27, no. 2,pp. 91 – 106, 2010.

L. A. Fourt and J. W. Woodlock, “Early prediction of market success for new grocery products.” Journal of Marketing, vol. 25,no. 2, pp. 31 – 38, 1960.

B. W. O, “Reference group influence on product and brand purchase decisions,” Journal of Consumer Research, vol. 9, pp. 183–1941982.

J. J. McAuley, C. Targett, Q. Shi, and A. van den Hengel, “Image based recommendations on styles and substitutes,” in SIGIR, 2015,pp. 43–52.

E. M.Rogers, Diffusion of Innovations. New York: The Rise of High-Technology Culture, 1983.

K. Sarkar and H. Sundaram, “How do we find early adopters who will guide a resource constrained network towards a desired distribution of behaviors?” in CoRR, 2013, p. 1303.

D. Imamori and K. Tajima, “Predicting popularity of twitter accounts through the discovery of link-propagating early adopters” in CoRR, 2015, p. 1512.

X.Rong and Q. Mei, “Diffusion of innovations revisited: from social network to innovation network,” in CIKM, 2013, pp. 499–508.

I. Mele, F. Bonchi, and A. Gionis, “The early-adopter graph and its application to web-page recommendation,” in CIKM, 2012, pp.1682–1686.

Y.-F. Chen, “Herd behavior in purchasing books online,” Computers in Human Behavior, vol. 24(5), pp. 1977–1992, 2008.

Banerjee, “A simple model of herd behaviour,” Quarterly Journal of Economics, vol. 107, pp. 797–817, 1992.

A. S. E, “Studies of independence and conformity: I. a minority of one against a unanimous majority,” Psychological monographs: General and applied, vol. 70(9), p. 1, 1956.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.