Privacy-Preserving Scalar Product Computation over Personal Health Records
Main Article Content
Abstract
Cloud computing utilizes networks of substantial gatherings of servers normally running minimal effort shopper PC innovation with particular associations with spread data-processing errands crosswise over them. This common IT framework contains extensive pools of frameworks that are connected together. Frequently, virtualization techniques are utilized to expand the force of Cloud computing. Checking and prompting patients by means of versatile social insurance framework is the present pattern in a therapeutic field that goes about as a lifeline because of its accessibility at whatever time and anyplace. This e-social insurance framework requires patient's private data to be accessible at a cloud, outsourced data stockpiling. This situation confronts privacy issues. In this paper, we concentrate on attribute-based access control and another privacy-preserving scalar product computation (PPSPC) strategy and
giving a private cloud to versatile clients to guarantee less cost, compelling and secure capacity. The data entered in the versatile is exchanged to the private cloud, which thus is handled and again exchanged to people in a general cloud. The affect ability of the outsourced cloud data is kept up utilizing Attribute-based Encryption method which restricts data access based on encoding/unscramble of data with its access structures. The data privacy is guaranteed by PRF based key administration and secures indexing methodologies. Individual Health records perceptibility access control to the real data proprietor is the center thought of this venture. The undertaking isolates the access clients into Public Domain Users and Private Domain client
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
Toninelli, R. Mont anari, and A. Corradi, “Enabling secure service discovery in mobile healt hcare enterprise
networks,” IEEE Wireless Communicat ions, vol. 16, pp. 24–32, 2009.
R. Lu, X. Lin, X. Liang, and X. Shen, “ Secure handshake with symptoms- matching: The essent ial to the success of mhealthcaresocial network,” in Proc. BodyNet s’10, Corfu Island, Greece, 2010.
Y. Ren, R. W. N. Pazzi, and A. Boukerche, “Monitoring pat ien s via a secure and mobile healt hcare system,” IEEE Wireless Communicat ions, vol. 17,pp. 59–65, 2010.
L. Guo, C. Zhang, J. Sun, and Y. Fang, “PAAS: Privacypreserving attribute-based authentication system for e-Health networks,” in Proc. IEEE Intl. Conf. Distrib. Comput. Syst., Jun. 2012, pp. 224–233.
J. Sun, X. Zhu, C. Zhang, and Y. Fang, “HCPP: Cryp-tography based secure EHR system for patient privacy and emergency healthcare,” in Proc. IEEE Int. Conf. Dis-trib. Comput. Syst., Jun. 2011, pp. 373–382.
J. Sun, X. Zhu, and Y. Fang, “Privacy and emergency response in E healthcare leveraging wireless body sensor networks,” IEEE Wireless Commun. vol. 17, no. 1, pp. 66–73, Feb. 2010.
J. Sun, X. Zhu, and Y. Fang, “Preserving privacy in emergency response based on wireless body sensor networks,” in Proc. IEEE Global Telecomm. Conf., Dec. 2010, pp. 1–6.
J. Sun, C. Zhang, Y. Zhang, and Y. Fang, “An identity-based security system for user privacy in vehicular ad hoc networks,” IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 9, pp. 1227–1239, Sep. 2010