“Enabling authentication and Access Control-Based Data Sharing with personal Information Hiding for Secure Cloud Storage”

  • Supriya Raywade , Ayushi Dixit, Shruti Jain, Deepali Jain

Abstract

Unfortunately, the e-healthcare cloud system has shown its potential to improve health care and the quality of life of the individual, privacy and security slows its general deployment and application There are a number of researches on the protective privacy of electric healthcare high (EHR). Information. However, all of these have two major limitations, they only work on the 'black or white' access regulator policy. Additionally, they suffer from mutual attack. In this paper, for the first time, we find that inferential attack-resistance

We first recommend a two-layer encryption scheme with an e-healthcare cloud company with a fine-grained access regulator. To ensure an effective and fine-grained controller over EHR data, we employ first-layer encryption, where we advance a specific threshold for each data feature in the EHR and independently encrypt it with high efficiency. To reserve an understanding of the role features and access strategies in first-layer encryption, we build second-layer encryption fully to the benefit of cloud server revenue. In order to protect the appearance of accessibility to, we will build an additional blind data retrieval protocol. We also show that we can easily extend our scheme to support search functionality. Finally, we perform extensive security analyzes and performance assessments.

Published
2020-07-01