A Survey on an Efficient Technique of Encryption Scheme and its Extension in Cloud Based PHR System

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2014 by IJETT Journal
Volume-10 Number-6
Year of Publication : 2014
Authors : Prachi Dhavane , Dipak Patil


Prachi Dhavane , Dipak Patil. "A Survey on an Efficient Technique of Encryption Scheme and its Extension in Cloud Based PHR System", International Journal of Engineering Trends and Technology (IJETT), V10(6),311-317 April 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group


Scalable and secure sharing of personal health record in cloud computing is an emerging trend in Health field for exchange and the use of personal Health information. This sensitive data is shared and stored by the third party reference in cloud computing. Therefore the need of encrypting data stored at this sites is highly essential to reduce the storage space and for the cost reduction. Since, the privacy management is a complex task in the PHR management process; the issues such as risk of privacy exposure, scalability, data loss, flexible access have remained the most important task. To achieve the fine grained and scalable data access, the ABE technique and its extensions are introduced in this paper. Here the focus is done on comparing the best method for achieving the fine grained and security.


[1] M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attribute-based systems,” Journal of Computer Security, vol. 18, no. 5, pp. 799–837, 2010.
[2] S. M¨uller, S. Katzenbeisser, and C. Eckert, “Distributed attribute- based encryption,” Information Security and Cryptology–ICISC 2008, pp. 20–36, 2009.
[3] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in IEEE S& P ’07, 2007, pp. 321–334.
[4] D.Boneh and M. Franklin. “Identity-Based Encryption from the Weil Pairing.” Proc. of CRYPTO’01, Santa Barbara, California, USA, 2001 .
[5] V. Goyal, O. Pandey, A. Sahai, and B. Waters. “Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data”, Proc. 13th ACM Conf. Computer and Comm. Security (CCS ’06), pp. 89-98, 2006.
[6] G. Wang, Q. Liu, and J.Wu, “Hierarchical attribute- based encryption for ?ne-grained access control in cloud storage services,” in Proceedings of the 17th ACM conference on Computer and communications security, pp. 735–737, 2010.
[7] S.Jahid,P.Mittal,N.Borisov,”Easier: Encryption- Based Acess Control in Social Networks with Efficient Revocation ,” Proc. ACMSynp. Information ,computer and Comm.Security, Mar.2011.
[8] Ramasamy S, Vahidhunnisha :” Survey on Multi Authority Attribute Based Encryption for Personal Health Record in Cloud Computing, ISSN: 2278-621X, November 2013.
[9] R. Ostrovsky, A. Sahai, and B. Waters, “Attribute- based encryption with non-monotonic access struc- tures,” in Proceedings of the 14th ACM conference on Computer and communications security, pp. 195– 203, 2007.
[10] Herzberg etc, “proactive secrete sharing(PSS),” in 1995
[11] Zhiguo Wan, Jun’e Liu, and Robert H. Deng, “HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing” IEEE Transactions On Information Forensics And Security, Vol. 7, No. 2, April 2012.
[12]Y.Zheng,”Key-Policy Attribute- Base Encryption Scheme Implementation,”http://www.cnsr.ictas.vt.edu/pbc/,2012.
[13] Cheng-chir Lee, Pei-shan C,” a survey on ABE scheme of access control in cloud environment, vol.15, no.4, pp-231-240, july2013.
[14] K.Geetha, ANANTHI SHESHASAAYEE: “survey on security issues in cloud computing”, ISSN: 2321-4058, Nov-2013.
[15] ” Secure threshold multi authority attribute based encryption without a central authority,” International Journal of Net- work Security.
[16] Neetha Xavier ,“ security of PHR in cloud computing using ABE technique, volume 01-No.72 issue: 07 nov 2013, ISSN num:22789723.

Attribute Based Encryption (ABE), Cloud Computing, Cloud Data Security, Personal Health Record (PHR), MA-ABE, Proactive MA-ABE, CA, Data Privacy, Fine-grained access control.