Attribute based Encryption to Control Illegal Definitions in HMS

B. Mounika, B. Mamatha


Vital details leak existing in wellness details of patients existing in SaaS Health Storage space Atmosphere leads to many harmful functions such as finding details for corporate espionage — like results in drug tests. Discovering figures that could be used to make scams. With wellness figures, it’s complex, but once an outsider haves them, the amounts of money they can scams out of companies like Medical health insurance, State health programs, Blue Cross,” are sub spatial. In that aspect prior system’s ability to use secure listing along with Feature Based Security delicate details helps in thwarting reasoning storage details leaking, it doesn’t address if risk occurs from within. A harmful inner scorned worker but neglect their rights and access then posts delicate wellness details all resulting in same problem again. So we recommend a powerful decrypting meta details embedding criteria that could somehow helpful in catching the harmful inner user although not immediately, but definitely some time in future when researchers get a hold of released delicate wellness details resulting in apprehending of the real criminal. Metadata may be located anywhere in the details file.  Except in linearized files (those enhanced for “fast web view”), things in a PDF details file can appear in any order. Furthermore, meta-data sources can be connected at the details file level or to any self-contained subassembly item in the details file, such as a page.

Full Text:



Yue Tong, “Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability”, IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 18, NO. 2, MARCH 2014.

P. Ray and J.Wimalasiri, “The need for technical solutions formaintaining the privacy of EHR,” in Proc. IEEE 28th Annu. Int. Conf., New York City, NY, USA, Sep. 2006, pp. 4686–4689.

M. C. Mont, P. Bramhall, and K. Harrison, “A flexible role-based secure messaging service: Exploiting IBE technology for privacy in health care,” presented at the 14th Int. Workshop Database Expert Syst. Appl., Prague, Czech Republic, 2003.

X. Liang, R. Lu, L.Chen, X. Lin, andX. Shen, “PEC:Aprivacy-preserving emergency call scheme formobile healthcare social networks” J. Commun. Netw., vol. 13, no. 2, pp. 102–112, 2011. L. Guo, C. Zhang, J. Sun, and Y. Fang, “A privacy-preserving attribute-based authentication system for mobile health networks,” IEEE Trans. Mobile Comput., vol. PP, no. 99, pp. 1–1, 2013.

W.-B. Lee and C.-D. Lee, “A cryptographic key management solution for HIPAA privacy/security regulations,” IEEE Trans. Inf. Technol. Biomed.,vol. 12, no. 1, pp. 34–41, Jan. 2008.

M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131–143, Jan. 2013.

S. S. M. Chow, “New privacy-preserving architectures for identity- /attribute-based encryption” Ph.D. dissertation, Courant Inst. Math. Sci., New York University, New York, NY, USA, 2010.

S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu, “SPICE—Simple privacy-preserving identity-management for cloud environment,” in Proc. 10th Int. Conf. Appl. Cryptography Netw. Security, 2012, pp. 526–543.

S. S. M. Chow, C.-K. Chu, X. Huang, J. Zhou, and R. H. Deng, “Dynamic secure cloud storage with provenance,” in Cryptography and Security, Berlin, Germany, Springer-Verlag, 2012, pp. 442–464.

JungAe Kwak and Hwan-Seung Yong, “Ontology matching based on hypernym, hyponym, holonym, and meronym sets in WordNet”, International journal of Web & Semantic Technology (IJWesT), Vol.1, No.2, April 2010.

J. Sun, X. Zhu, C. Zhang, andY. Fang, “HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare,” in Proc. IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2011, pp. 373–382.

L. Guo, C. Zhang, J. Sun, and Y. Fang, “PAAS: Privacy-preserving attribute-based authentication system for eHealth networks,” in Proc. IEEE Intl. Conf. Distrib. Comput. Syst., Jun. 2012, pp. 224–233.

J. Sun, X. Zhu, C. Zhang, and Y. Fang, Security and Privacy for Mobile Healthcare (m-Health) Systems, in Handbook on Securing Cyber-Physical Infrastructure, S. Das, K. Kant, and N. Zhang, Eds. Amsterdam, The Netherlands: Elsevier, 2011.



  • There are currently no refbacks.