Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 1
Page No. 65 - 72

Attribute Base Access Control to Secure the Patient Health Record in Cloud

Authors : B. Seetharamulu and G.V. Uma


Akinyele, J.A., M.W. Pagano, M.D. Green, C.U. Lehmann and Z.N. Peterson et al., 2011. Securing electronic medical records using attribute-based encryption on mobile devices. Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, October 17-21, 2011, ACM, Chicago, IL, USA., pp: 75-86.

Goyal, V., 2007. Certificate Rrevocation Using Fine Grained Certificate Space Partitioning. In: Financial Cryptography and Data Security. Sven, D. and R. Dhamija (Eds.). Springer Berlin Heidelberg, Berlin, Germany, pp: 247-259.

Goyal, V., O. Pandey, A. Sahai and B. Waters, 2006. Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, October 30-November 3, 2006, ACM Press, Alexandria, VA, USA., pp: 89-98.

Ibraimi, L., M. Asim and M. Petkovic, 2009. Secure management of personal health records by applying attribute-based encryption. Proceesding of the 6th International Workshop on Wearable Micro and Nano Technologies for Personalized Health (pHealth), 2009, June 24-26, 2009, IEEE, 0slo, Norway, Europe, pp: 71-74.

Li, M., S. Yu, K. Ren and W. Lou, 2010. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. Proceedings of the 6th International ICST Conference on Security and Privacy in Communication Networks, September 7-9, 2010, Singapore, pp: 89-106.

Mandl, K.D., W.W. Simons, W.C. Crawford and J.M.I. Abbett, 2007. Personally controlled health record for health information exchange and communication. BMC. Med. Inf. DecisMak., 7: 1-10.

Mell, P. and T. Grance, 2011. The NIST Definition of Cloud Computing. NIST Special Publication, Maryland, USA., Pages: 50.

Narayan, S., M. Gagne and R.S. Naini, 2010. Privacy preserving EHR system using attribute-based infrastructure. Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, October 04-08, 2010, ACM, Chicago, IL, USA., pp: 47-52.

Ostrovsky, R., A. Sahai and B. Waters, 2007. Attribute-based encryption with non-monotonic access structures. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 28-31, 2007, ACM, New York, USA., pp: 195-203-10.1145/1315245.1315270.

Sahai, A. and B. Waters, 2005. Fuzzy identity based encryption. Adv. Cryptol. Eurocrypt, 3494: 457-473.
CrossRef  |  

Waters, B., 2011. Ciphertext-policy attribute-based encryption: An expressive, efficient and provably secure realization. Proceeding of the 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Springer Berlin Heidelberg, Taormina, Italy, pp: 53-70.

Yin, C. and R. Zhang, 2011. Access control for the smart meters based on ABE. Proceeding of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2011, October 10-12, 2011, IEEE, Beijing, China, pp: 79-82.

Zheng, Y., 2011. Privacy-preserving personal health record system using attribute-based encryption. MS Thesis, Worcester Polytechnic Institute, Massachusetts, USA.

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved