Data Access Control and Secured Data Sharing Approach for Health Care Data in Cloud Environment

被引:0
|
作者
A. Pugazhenthi
D. Chitra
机构
[1] P. A. College of Engineering and Technology,Department of Computer Science and Engineering
来源
关键词
Cloud security; Access control; Encryption; Secured key sharing; Access policy limitation;
D O I
暂无
中图分类号
学科分类号
摘要
One of the vital hitches in today’s world of research is ensuring the security of the Cloud. This security can be ensured by inventing new techniques that may possibly help in safeguarding and assuring the optimal status of information in the cloud. Contents that are stored in the Cloud are majorly affected by the attempts made by illegitimate sources that are trying to access it. The security level of the contents that are stored in the cloud can be guaranteed by focusing on a task that helps in both securing and verifying the data. In order to manage the security level, (SE-KAC) which is also known as Scalable and Enhanced Key-Aggregate Cryptosystem was initiated in current research method. But this method of securing and sharing secret keys cannot be used in the stage of decryption. However this problem can be resolved in proposed method since it introduces sharing of the data securely using a method called Improved Diffie Hellman Key Exchange Algorithm (IDHKE). By introducing the Improved Diffie Hellman Key Exchange Algorithm, securely sharing the secret keys to the receivers of the data has been achieved. The secret key details can be exchanged securely using this method. By this means it makes sure its affirmations. Here the key is safely generated using one random prime number, a master secret key and parameter value. Intended for the secured and consistent access control limitation, an encryption which is attribute-based is used. The proposed method thus ensures the protected data transmission with exact and trustworthy validation.
引用
收藏
相关论文
共 50 条
  • [31] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    V. Sri Vigna Hema
    Ramesh Kesavan
    Wireless Personal Communications, 2019, 108 : 1021 - 1035
  • [32] A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
    Al Mayyahi, Mustafa Azeez
    Seno, Seyed Amin Hosseini
    BAGHDAD SCIENCE JOURNAL, 2022, 19 (06) : 1572 - 1580
  • [33] Access control for trusted data sharing
    Zubair, Maria
    Sabzevari, Maryam
    Khatri, Vikramajeet
    Tarkoma, Sasu
    Haetoenen, Kimmo
    EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01):
  • [34] Towards Data Minimization and Access Control for Immunization Data Sharing
    Chaisawat, Siriboon
    Piyoungkorn, Kajornsak
    Sirapaisan, Soontorn
    Vorakulpipat, Chalee
    PROCEEDINGS OF 2022 14TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS, MEDES 2022, 2022, : 16 - 23
  • [35] Secured and Privacy-Preserving Multi-Authority Access Control System for Cloud-Based Healthcare Data Sharing
    Gupta, Reetu
    Kanungo, Priyesh
    Dagdee, Nirmal
    Madhu, Golla
    Sahoo, Kshira Sagar
    Jhanjhi, N. Z.
    Masud, Mehedi
    Almalki, Nabil Sharaf
    AlZain, Mohammed A.
    SENSORS, 2023, 23 (05)
  • [36] A privacy protection model for health care big data based on trust evaluation access control in cloud service environment
    Hu, Xiaohan
    Jiang, Rong
    Shi, Mingyue
    Shang, Jingwei
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (03) : 3167 - 3178
  • [37] Secured access control of distributed healthcare data sources
    Chu, S
    Mair, M
    INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 6, POST-CONFERENCE ISSUE, PROCEEDINGS, 2004, : 317 - 322
  • [38] Secured Document Sharing Using Visual Cryptography in Cloud Data Storage
    Brindha, K.
    Jeyanthi, N.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (04) : 111 - 123
  • [39] Efficient and Secured Approach for Faster Data Availability and Restoration in Disaster Cloud Data Management
    Tripathi, Aditi
    Khare, Mayank Deep
    Singh, Pradeep Kumar
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1107 - 1112
  • [40] A Cloud Access Security Broker Based Approach for Encrypted Data Search and Sharing
    Liu, Chuanyi
    Wang, Guofeng
    Han, Peiyi
    Pan, Hezhong
    Fang, Binxing
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 422 - 426