A new dynamic access control technique to maintain PHRS in cloud

Syed Nazural Islam, Lova Raju U

Abstract


We propose another access control conspire for PHRs which can be given by different patients. The plan comprises of ABE layer and symmetric key layer. In ABE layer, the plan bolsters a multi-benefit get to control for PHRs from multi-patients. The plan joins the encryption of information from various patients where the information are under a similar access approach to take care of the issue of tedious procedure in encryptions of these information, with the goal that the expense of encryption and unscrambling can be diminished. The plan accomplishes a productive, adaptable, and fine-grained get to control on PHRs. In symmetric key layer, symmetric keys coordinate restorative specialists' entrance benefits and the keys with higher benefit can infer keys with lower benefit, not the a different way. The patients scramble each class of information with relating symmetric keys in symmetric key layer, and encode the symmetric keys in the ABE layer. We demonstrate our plan is secure dependent on security of CP-ABE.


References


J. McAuley and A. Yang, “Addressing complex and topicive product-related queries with customer reviews,” in WWW, 2016,pp. 625–635.

N. V. Nielsen, “E-commerce: Evolution or revolution in the fast moving consumer goods world,” nn group. com, 2014.

W. D. J. Salganik M J, Dodds P S, “Experimental study of ineattribute and unpredictability in an artificial cultural market,” in ASONAM, 2016, pp. 529–532.

R. Peres, E. Muller, and V. Mahajan, “Innovation diffusion and new product growth models: A critical review and research directions,”International Journal of Research in Marketing, vol. 27, no. 2,pp. 91 – 106, 2010.

L. A. Fourt and J. W. Woodlock, “Early prediction of market success for new grocery products.” Journal of Marketing, vol. 25,no. 2, pp. 31 – 38, 1960.

B. W. O, “Reference group influence on product and brand purchase decisions,” Journal of Consumer Research, vol. 9, pp. 183–1941982.

J. J. McAuley, C. Targett, Q. Shi, and A. van den Hengel, “Image based recommendations on styles and substitutes,” in SIGIR, 2015,pp. 43–52.

E. M.Rogers, Diffusion of Innovations. New York: The Rise of High-Technology Culture, 1983.

K. Sarkar and H. Sundaram, “How do we find early adopters who will guide a resource constrained network towards a desired distribution of behaviors ?” in CoRR, 2013, p. 1303.

D. Imamori and K. Tajima, “Predicting popularity of twitter accounts through the discovery of link-propagating early adopters” in CoRR, 2015, p. 1512.

X.Rong and Q. Mei, “Diffusion of innovations revisited: from social network to innovation network,” in CIKM, 2013, pp. 499–508.

I. Mele, F. Bonchi, and A. Gionis, “The early-adopter graph and its application to web-page recommendation,” in CIKM, 2012, pp.1682–1686.

Y.-F. Chen, “Herd behavior in purchasing books online,” Computers in Human Behavior, vol. 24(5), pp. 1977–1992, 2008.

Banerjee, “A simple model of herd behaviour,” Quarterly Journal of Economics, vol. 107, pp. 797–817, 1992.

A. S. E, “Studies of independence and conformity: I. a minority of one against a unanimous majority,” Psychological monographs: General and applied, vol. 70(9), p. 1, 1956.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.