A Novel Access Control Procedure To Maintain Health Records In Cloud

Prabha Sailaja Palagummi

Abstract


PHRs comprise of the patient information regularly gathered from different sources including medical clinics and general practice focuses. Various patients' entrance approaches have a typical access sub arrangement. In this paper, we propose a novel Attribute-Based Encryption conspire for fine-grained and adaptable access control to PHRs information in distributed computing. The plan produces shared data by the regular access subpolicy which depends on various patients' entrance strategies. At that point the plan consolidates the encryption of PHRs from various patients. In this manner, both time utilization of encryption and unscrambling can be decreased. Restorative staff requires shifting degrees of access to PHRs. The proposed plan can likewise bolster multi-benefit access control with the goal that medicinal staff can get to the required degree of data while amplifying quiet protection.


References


J. McAuley and A. Yang, “Addressing complex and topicive product-related queries with customer reviews,” in WWW, 2016,pp. 625–635.

N. V. Nielsen, “E-commerce: Evolution or revolution in the fast moving consumer goods world,” nn group. com, 2014.

W. D. J. Salganik M J, Dodds P S, “Experimental study of inattribute and unpredictability in an artificial cultural market,” in ASONAM, 2016, pp. 529–532.

R. Peres, E. Muller, and V. Mahajan, “Innovation diffusion and new product growth models: A critical review and research directions,”International Journal of Research in Marketing, vol. 27, no. 2,pp. 91 – 106, 2010.

L. A. Fourt and J. W. Woodlock, “Early prediction of market success for new grocery products.” Journal of Marketing, vol. 25,no. 2, pp. 31 – 38, 1960.

B. W. O, “Reference group influence on product and brand purchase decisions,” Journal of Consumer Research, vol. 9, pp. 183–1941982.

J. J. McAuley, C. Targett, Q. Shi, and A. van den Hengel, “Image based recommendations on styles and substitutes,” in SIGIR, 2015,pp. 43–52.

E. M.Rogers, Diffusion of Innovations. New York: The Rise of High-Technology Culture, 1983.

K. Sarkar and H. Sundaram, “How do we find early adopters who will guide a resource constrained network towards a desired distribution of behaviors?” in CoRR, 2013, p. 1303.

D. Imamori and K. Tajima, “Predicting popularity of twitter accounts through the discovery of link-propagating early adopters” in CoRR, 2015, p. 1512.

X.Rong and Q. Mei, “Diffusion of innovations revisited: from social network to innovation network,” in CIKM, 2013, pp. 499–508.

I. Mele, F. Bonchi, and A. Gionis, “The early-adopter graph and its application to web-page recommendation,” in CIKM, 2012, pp.1682–1686.

Y.-F. Chen, “Herd behavior in purchasing books online,” Computers in Human Behavior, vol. 24(5), pp. 1977–1992, 2008.

Banerjee, “A simple model of herd behaviour,” Quarterly Journal of Economics, vol. 107, pp. 797–817, 1992.

A. S. E, “Studies of independence and conformity: I. a minority of one against a unanimous majority,” Psychological monographs: General and applied, vol. 70(9), p. 1, 1956.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.