TY - GEN
T1 - Enhanced timing enabled proxy re-encryption model for E-health data in the public cloud
AU - Bhateja, Richa
AU - Saxena, Naman
AU - Acharjya, Debi Prasanna
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/11/30
Y1 - 2017/11/30
N2 - The advancements made in cloud applications attracts the healthcare society. The analysis over Electronic Health Record (EHR) gains much importance among the research communities. As EHR contains sensitive information, the need of security and privacy is to be analyzed effectively. The services like outsourcing and increased computation has enhanced the usage of the digital technologies. The digital data interconnects with different network devices which lead to the study of reliability, scalability and security. Security is the major part of the outsourced databases. Prior works like searchable encryption and proxy re-encryption have been introduced by research communities. Still, the security requirements of the healthcare application are not yet achieved. Notwithstanding, prior searching encryption degrades in terms of storage computation. In this paper, we have proposed timing enabled proxy reencryption system that permits users to access the data under certain time period T. Each identified user is defined with set of attributes and valid time period T. Security analysis in terms of decryption key compromised, Expiration of identity, conjunctive based similarity keyword search and lessened complexity of key update phase have been studied.
AB - The advancements made in cloud applications attracts the healthcare society. The analysis over Electronic Health Record (EHR) gains much importance among the research communities. As EHR contains sensitive information, the need of security and privacy is to be analyzed effectively. The services like outsourcing and increased computation has enhanced the usage of the digital technologies. The digital data interconnects with different network devices which lead to the study of reliability, scalability and security. Security is the major part of the outsourced databases. Prior works like searchable encryption and proxy re-encryption have been introduced by research communities. Still, the security requirements of the healthcare application are not yet achieved. Notwithstanding, prior searching encryption degrades in terms of storage computation. In this paper, we have proposed timing enabled proxy reencryption system that permits users to access the data under certain time period T. Each identified user is defined with set of attributes and valid time period T. Security analysis in terms of decryption key compromised, Expiration of identity, conjunctive based similarity keyword search and lessened complexity of key update phase have been studied.
UR - https://www.scopus.com/pages/publications/85042750516
UR - https://www.scopus.com/inward/citedby.url?scp=85042750516&partnerID=8YFLogxK
U2 - 10.1109/ICACCI.2017.8126145
DO - 10.1109/ICACCI.2017.8126145
M3 - Conference contribution
AN - SCOPUS:85042750516
VL - 2017-January
T3 - 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
SP - 2040
EP - 2044
BT - 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
Y2 - 13 September 2017 through 16 September 2017
ER -