Transmission of Secure Sensitive Health Care Information Using Hybrid Encryption in Cloud Computing

  • Sonya A et al.

Abstract

The patient medical record maintenance is sensitive and crucial task in health care sectors. The patient medical care records are stored in a huge data set; it can be stored, maintained and traced every day. The objective is how to track the patient’s medical reports safely. The block chain technology is used to store the patient medical care records healthcare in the cloud. Here achieve forward and backward security of the data with a revocation scheme. To enable access control that is cryptographically enhanced. The data is encrypted for secure maintenance. The AES algorithm is used to encrypt our data to provide data security. To ensure a proper protection mechanism in the cloud database management system. To perform secure and efficient query processing. The block that contains the medical data with the time stamp. Cloud computing will connect different healthcare providers. The Cloud Service Provider can view all the uploaded and downloaded documents in the Cloud. The CSP receives the document request from the Data User, verifies the authentication before granting permission. Then the CSP processing the query and will get back the encrypted document based on using the searching technique and also returns additional proof with the document, to verify the search result. It allows the healthcare provider to access the patient details more securely from anywhere. It can protect patient’s details from attackers. The healthcare providers have to execute the encryption and decryption techniques mainly used to download the patient’s record details data using the decryption process. The exact results given that our proposal provides an effective solution for reliable data exchanges on cloud while preserving sensitive health information against potential threats.

Published
2019-11-15
How to Cite
et al., S. A. (2019). Transmission of Secure Sensitive Health Care Information Using Hybrid Encryption in Cloud Computing. International Journal of Advanced Science and Technology, 28(15), 344 - 354. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/1634
Section
Articles