Privacy-Preserving Scalar Product Computation over Personal Health Records

Main Article Content

K.Samunnisa
Bhavsingh Maloth

Abstract

Cloud computing utilizes networks of substantial gatherings of servers normally running minimal effort shopper PC innovation with particular associations with spread data-processing errands crosswise over them. This common IT framework contains extensive pools of frameworks that are connected together. Frequently, virtualization techniques are utilized to expand the force of Cloud computing. Checking and prompting patients by means of versatile social insurance framework is the present pattern in a therapeutic field that goes about as a lifeline because of its accessibility at whatever time and anyplace. This e-social insurance framework requires patient's private data to be accessible at a cloud, outsourced data stockpiling. This situation confronts privacy issues. In this paper, we concentrate on attribute-based access control and another privacy-preserving scalar product computation (PPSPC) strategy and
giving a private cloud to versatile clients to guarantee less cost, compelling and secure capacity. The data entered in the versatile is exchanged to the private cloud, which thus is handled and again exchanged to people in a general cloud. The affect ability of the outsourced cloud data is kept up utilizing Attribute-based Encryption method which restricts data access based on encoding/unscramble of data with its access structures. The data privacy is guaranteed by PRF based key administration and secures indexing methodologies. Individual Health records perceptibility access control to the real data proprietor is the center thought of this venture. The undertaking isolates the access clients into Public Domain Users and Private Domain client


 


 

Article Details

How to Cite
[1]
K.Samunnisa and B. Maloth, “Privacy-Preserving Scalar Product Computation over Personal Health Records”, Int. J. Comput. Eng. Res. Trends, vol. 3, no. 2, pp. 42–46, Mar. 2016.
Section
Research Articles
Author Biographies

K.Samunnisa, Assistant Professor, GPCET, Kurnool

 

 

Bhavsingh Maloth, Assistant Professor, GPCET, Kurnool

 

 

References

Toninelli, R. Mont anari, and A. Corradi, “Enabling secure service discovery in mobile healt hcare enterprise

networks,” IEEE Wireless Communicat ions, vol. 16, pp. 24–32, 2009.

R. Lu, X. Lin, X. Liang, and X. Shen, “ Secure handshake with symptoms- matching: The essent ial to the success of mhealthcaresocial network,” in Proc. BodyNet s’10, Corfu Island, Greece, 2010.

Y. Ren, R. W. N. Pazzi, and A. Boukerche, “Monitoring pat ien s via a secure and mobile healt hcare system,” IEEE Wireless Communicat ions, vol. 17,pp. 59–65, 2010.

L. Guo, C. Zhang, J. Sun, and Y. Fang, “PAAS: Privacypreserving attribute-based authentication system for e-Health networks,” in Proc. IEEE Intl. Conf. Distrib. Comput. Syst., Jun. 2012, pp. 224–233.

J. Sun, X. Zhu, C. Zhang, and Y. Fang, “HCPP: Cryp-tography based secure EHR system for patient privacy and emergency healthcare,” in Proc. IEEE Int. Conf. Dis-trib. Comput. Syst., Jun. 2011, pp. 373–382.

J. Sun, X. Zhu, and Y. Fang, “Privacy and emergency response in E healthcare leveraging wireless body sensor networks,” IEEE Wireless Commun. vol. 17, no. 1, pp. 66–73, Feb. 2010.

J. Sun, X. Zhu, and Y. Fang, “Preserving privacy in emergency response based on wireless body sensor networks,” in Proc. IEEE Global Telecomm. Conf., Dec. 2010, pp. 1–6.

J. Sun, C. Zhang, Y. Zhang, and Y. Fang, “An identity-based security system for user privacy in vehicular ad hoc networks,” IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 9, pp. 1227–1239, Sep. 2010