A Multi-Authority Cipher Text Attribute-Based Encryption (CP-ABE) for G2C

Ch. Ramya, K.V.V.L. Madhuri


We propose an adaptable, secure, cost savvy, and protection preserved cloud-based system for the healthcare condition. We propose a safe and proficient structure for the administration EHR framework, in which fine-grained get to control can be managed dependent on multi-authority ciphertext attribute based encryption (CP-ABE), together with a progressive structure, to uphold get to control strategies. The proposed system will permit chiefs in the Kingdom of Saudi Arabia to build up the social insurance segment and to profit by the current e-government cloud computing stage Yasser, which is liable for conveying shared services through a profoundly proficient, dependable, and safe condition. This system means to give health services and offices from the government to citizens (G2C).


Masrom, Maslin, and AilarRahimli. "A Review of Cloud Computing Technology Solution for Healthcare System." Research Journal of Applied Sciences, Engineering and Technology 8, no. 20 (2014): 2150–2155.

HUCÍKOVÁ, Anežka, and AnkicaBabic. "Cloud Computing in Healthcare: A Space of Opportunities and Challenges." Transforming Healthcare with the Internet of Things (2016): 122.

Yang, Haibo, and Mary Tate. "A descriptive literature review and classification of cloud computing research." CAIS 31 (2012): 2.

Zissis, Dimitrios, and DimitriosLekkas. "Addressing cloud computing security issues." Future Generation computer systems 28, no. 3 (2012): 583–592.

Nigam, Vaibhav Kamal, and Shubham Bhatia. "Impact of Cloud Computing on Health Care." (2016).

Mehraeen, Esmaeil, MarjanGhazisaeedi, JebraeilFarzi, and SagharMirshekari. "Security Challenges in Healthcare Cloud computing: A Systematic Review." Global Journal of Health Science 9, no. 3 (2016): 157.

Sun, Dawei, Guiran Chang, Lina Sun, and Xingwei Wang. "Surveying and analyzing security, privacy and trust issues in cloud computing environments." Procedia Engineering 15 (2011): 2852–2856.

Khan, Nabeel, and Adil Al-Yasiri. "Identifying cloud security threats to strengthen cloud computing adoption framework." Procedia Computer Science 94 (2016): 485–490.

Hamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. "Security issues for cloud computing." Optimizing Information Security and Advancing Privacy Assurance: New Technologies: New Technologies 150 (2012).

Omachonu, Vincent K., and Norman G. Einspruch. "Innovation in healthcare delivery systems: a conceptual framework." The Innovation Journal: The Public Sector Innovation Journal 15, no. 1 (2010): 1–20.

Reddy, B. Eswara, TV Suresh Kumar, and GandikotaRamu. "An efficient cloud framework for health care monitoring system." In Cloud and Services Computing (ISCOS), 2012 International Symposium on, pp. 113-117. IEEE, 2012.

Parekh, Maulik, and B. Saleena. "Designing a cloud based framework for healthcare system and applying clustering techniques for region wise diagnosis." Procedia Computer Science 50 (2015): 537–542.

Botta, Alessio, Walter De Donato, Valerio Persico, and Antonio Pescapé. "Integration of cloud computing and internet of things: a survey." Future Generation Computer Systems 56 (2016): 684–700

Stergiou, Christos, Kostas E. Psannis, Byung-Gyu Kim, and Brij Gupta. "Secure integration of IoT and cloud computing." Future Generation Computer Systems 78,(2018):964–975.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.