secure and efficient sharing of health records using random key generation technique

LAVINA BALRAJ, M.E., ,M.SASIKALA,R.BAVYA, A.DURGA

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 04 May,2021         Pages:1643-1648

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Sharing digital medical records on public cloud storage via devices facilitates patients (doctors) to get (offer) medical treatment of high quality and efficiency. However, challenges such as data privacy protection, flexible data sharing, efficient authority delegation, computation efficiency optimization, are remaining toward achieving practical fine-grained access control in the Electronic Medical Record (EMR) system. Nevertheless, storing the confidential health information to cloud servers is susceptible to revelation or theft and calls for the development of methodologies that ensure the privacy of the EMR. Therefore, a methodology called secure sharing of the EMR (SeSEMR) in the cloud has been implemented. The SeSEMR scheme ensures patient-centric control on the EMR and preserves the confidentiality of the EMR. The patients store the encrypted EMR on the un-trusted cloud servers and selectively grant access to different types of users on different portions of the PHRs. A semi-trusted proxy called Setup and Re-encryption Server (SRS) is introduced to set up the public/private key pairs and to produce the re-encryption keys. In our proposed RC4 algorithm is used to encrypt data and random key generator is used for every request.

Kewords

RC4-Rivest cipher 4, API – Application Programming Interface, SAS– Storage aggregation Server.

Reference

[1] A. Solanas and A. Martínez-Balles “V-MDAV: Variable group size multivariate microaggregation,” pp. 917– 925. [2] Greenberg, 1987, Rank Swapping for Masking Ordinal Microdata Tech report. U.S. Bureau of the Census, unpublished. [3] “Brand Microdata protection through noise addition, 2002,” Lecture Notes in Computer Sci., vol. 2316, pp. 97–116. [4] Pagliuca and G. Seri, 1998, “Some Results of Individual Ranking Method on the System of Enterprise Accounts Annual Survey”, Esprit SDC Project, Deliverable MI3/D2. [5] G. J. Matthews and O. Harel, 2011, “Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy,” Statist. Surveys, vol. 5, pp. 1–29.