Asian Journal of Information Technology

Year: 2014
Volume: 13
Issue: 9
Page No. 552 - 560

Multiple Attributes Based Secured Sharing of Personal Health Records in Cloud Computing Using Blowfish Algorithm

Authors : S. Rinesh and K. Baskaran

References

Alshehri, S., S. Radziszowski and R.K. Raj, 2012. Designing a secure cloud-based EHR system using Ciphertext-policy attribute-based encryption. Proceedings of the Data Management in the Cloud Workshop, April 5, 2012, Washington, DC., USA., pp: 1-5.

Bethencourt, J., A. Sahai and B. Waters, 2007. Ciphertext-policy attribute-based encryption. Proceedings of the IEEE Symposium on Security and Privacy, May 20-23, 2007, Berkeley, CA., USA., pp: 321-334.

Chase, M. and S.S.M. Chow, 2009. Improving privacy and security in multi-authority attribute-based encryption. Proceedings of the 16th ACM Conference on Computer and Communications Security, November 9-13, 2009, Chicago, IL., USA., pp: 121-130.

Chase, M., 2007. Multi-authority attribute based encryption. Proceedings of the 4th Theory of Cryptography Conference, February 21-24, 2007, Amsterdam, The Netherlands, pp: 515-534.

Cottom, B.A., 2004. Blowfish. CS 6520 Cryptography, August 18, 2004. http://claymore.engineer.gvsu.edu/~parikhc/blowfish.pdf.

Goyal, V., O. Pandey, A. Sahai and B. Waters, 2006. Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, October 30-November 3, 2006, ACM Press, Alexandria, VA, USA., pp: 89-98.

Li, M., S. Yu, K. Ren and W. Lou, 2010. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. Proceedings of the 6th International ICST Conference on Security and Privacy in Communication Networks, September 7-9, 2010, Singapore, pp: 89-106.

Li, M., S. Yu, Y. Zheng, K. Ren and W. Lou, 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst., 24: 131-143.
CrossRef  |  Direct Link  |  

Lohr, H., A.R. Sadeghi and M. Winandy, 2010. Securing the e-health cloud. Proceedings of the 1st ACM International Health Informatics Symposium, November 11-12, 2010, Arlington, VA., USA., pp: 220-229.

Madnani, B.R. and N. Sreedevi, 2013. Attribute based encryption for scalable and secure sharing of medical records in cloud computing design and implementation. Int. J. Innov. Res. Comput. Commun. Eng., 1: 523-530.
Direct Link  |  

Mandal, P.C., 2012. Superiority of blowfish algorithm. Int. J. Adv. Res. Comput. Sci. Software Eng., 2: 196-201.
Direct Link  |  

McPherson, J.M., W. Jetz and D.J. Rogers, 2006. Using coarse-grained occurrence data to predict species distributions at finer spatial resolutions: Possibilities and limitations. Ecol. Modell., 192: 499-522.
CrossRef  |  Direct Link  |  

Musthafa, S. and D.B. Sudarsa, 2013. Patient-centric secure data sharing frame work for cloud-based PHR systems. Int. J. Eng. Sci. Invention, 2: 17-26.
Direct Link  |  

Parameswaran, T., S. Vanitha and K.S. Arvind, 2013. An efficient sharing of personal health records using DABE in secure cloud environment. Int. J. Adv. Res. Comput. Eng. Technol., 2: 925-932.
Direct Link  |  

Saranya, R.K. and V.L. Jyothi, 2013. Maintaining and secure sharing of personal health records in cloud environment. Proceedings of the National Conference on Architecture, Software systems and Green Computing, May 3, 2013, Department of Computer Science and Engineering, Aarupadai Veedu Institute of Technology, Paiyanoor, Tamil Nadu, India, pp: 1-5.

Shaheen Taj, S.A., P. Kiran and Elavarasi, 2013. A novel method for patient centric secure and scalable sharing of PHR in cloud computing using encryption. Int. J. Soft Comput. Eng., 3: 226-232.

Vidya, S., K. Vani and D.K. Priya, 2012. Secured personal health records transactions using homomorphic encryption in cloud computing. Int. J. Eng. Res. Technol., Vol. 1, No. 10.

Vijayapriya, M. and A. Malathi, 2013. On demand security for personal health record in cloud computing using encryption and decryption cryptography. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 1083-1087.

Yu, S., C. Wang, K. Ren and W. Lou, 2010. Attribute based data sharing with attribute revocation. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, April 13-16, 2010, Beijing, China, pp: 261-270.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved