International Journal of Advances in Electronics and Computer Science ( IJAECS )
A highly rated peer reviewed monthly International Journal
Editor-in-Chief : Dr. P. Suresh
Contact Person : Technical Editor
Contact Mail : [email protected]  
Current Issue : Volume-11,Issue-2  ( Feb, 2024 ) View More
Journal Impact Factor : 2.68 View More

Journal Info
Publisher:IRAJ
ISSN (p): 2394-2835
Issues /Year :12
Stay up-to-date
Register your interests and receive email alerts tailored to your needs
Follow us
facebook twitter linked in

Paper Detail


Paper Title
Patient Health Record System Using Attribute Based Access Control Technique

Abstract
The cloud computing offers the efficient and scalable computing and storages, using this number of traditional and new generation applications are getting computational and storage benefits according their needs. In these applications sometime more sensitive and confidential data are communicated, thus the data owners are worried about the leakage of data or other privacy concerns. In addition of that in an organizational environment the similar authorities can access similar kinds of data with the similar access rights. But it is required to provide the functionality to incorporate the user defined privileges for securing the data confidentiality. This in this presented work the access control techniques and the security concern are studied. The proposed work involves the addressing of problem using a PHR (patient health record) system. In this PHR system three different kinds of users are implemented namely patient, researcher and doctor. Additionally for regulating the access of the users to the data an ABAC (attribute based access control) technique is presented. The presented technique provides the cryptographic data security and access control using the hybrid cryptographic approach. To design the proposed ABAC model the tiger hash generation algorithm and the blowfish cryptographic algorithm is proposed and implemented. The implementation of the proposed methodology is given using JAVA technology. Additionally for deployment of the implemented technique the OpenShift cloud platform is used. Finally for comparison of the cryptographic technique a SHA1 and DES algorithm based model is compared with the proposed model using the encryption and decryption time and space complexity. According to the gained experimental outcomes the proposed technique found efficient as compared to traditional cryptographic model. Keywords— PHR, access control, cryptography, implementation, ABAC models.


Author - Abhineet Dubey, Anand Rajavat

Published : Volume-3,Issue-8  ( Aug, 2016 )


DOIONLINE Number - IJAECS-IRAJ-DOIONLINE-5386   View Here

| PDF |
Viewed - 42
| Published on 2016-09-15
   
   
PAST ISSUES
Volume-11,Issue-1  ( Jan, 2024 )
Volume-10,Issue-12  ( Dec, 2023 )
Volume-10,Issue-11  ( Nov, 2023 )
Volume-10,Issue-10  ( Oct, 2023 )
Volume-10,Issue-9  ( Sep, 2023 )
Volume-10,Issue-8  ( Aug, 2023 )
Volume-10,Issue-7  ( Jul, 2023 )
Volume-10,Issue-6  ( Jun, 2023 )
Volume-10,Issue-5  ( May, 2023 )
Volume-10,Issue-4  ( Apr, 2023 )
Journal Indexed