Intelligent Attribute Based Encryption (IABE) Mechanism for Health Records in Cloud

  • Ranjith Kumar VollalaEmail author
  • L. Venkateswara Reddy
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 810)


Various possible definitions are to be found in appropriated figuring. A vast bit of them focuses on the development in a manner of speaking. Research has been done to merge all these particular definitions to come up with one uniform definition. Conveyed processing can best be depicted as a mammoth pool which contains gear, programming and diverse organizations that can be gotten to through the “cloud”. Each one of these advantages can be gotten to at whatever point generally. A significant part of the time the provider of the cloud offers his organization as pay-per-use. This infers there is high versatility in the use of these organizations as extra resources are always available. Moving fragile data from in-house IT system to a cloud arrange has transformed into a mind-boggling and testing undertaking. This paper proposes another protected technique to secure customer fragile data. In this methodology, we are considering therapeutic administrations data. We are using multilevel quality based encryption plot for securing customer’s wellbeing records. The trial comes to fruition demonstrate ideal results over existing techniques.


Encryption Health care Cloud PHR Key 


  1. 1.
    Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)CrossRefGoogle Scholar
  2. 2.
    Hine, J.H., Yao, W., Bacon, J., Moody, K.: An architecture for distributed OASIS services. In: Proceedings of International Conference on Distributed Systems Platforms and Open Distributed Processing, vol. 1795, pp. 104–120. Springer, Apr 2000Google Scholar
  3. 3.
    Eyers, D., Bacon, J., Moody, K.: OASIS role-based access control for electronic health records. In: IEEE Proceedings—Software, vol. 153, pp. 16–23 (2006)CrossRefGoogle Scholar
  4. 4.
    Jin, J., Ahn, G.-J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for sharing electronic health records. In: Proceedings of 14th ACM Symposium on Access Control Models and Technologies, pp. 125–134. ACM (2009)Google Scholar
  5. 5.
    Jin, J., Ahn, G.-J., Covington, M.J., Zhang, X.: Toward an access control model for sharing composite electronic health records. In: Proceedings of 4th International Conference on Collaborative Computing, Nov 2008Google Scholar
  6. 6.
    Coiera, E., Clarke, R.: e-Consent: the design and implementation of consumer consent mechanisms in an electronic environment. J. Am. Med. Inform. Assoc. 11(2), 129–140 (2004)CrossRefGoogle Scholar
  7. 7.
    openEHR Foundation: openEHR: an open domain-driven platform for developing flexible e-health systemsGoogle Scholar
  8. 8.
    Reddy, L.V., Kumar, N.S.: Multi layer encryption using access control in public clouds. i-Managers’ J. Cloud Comput. 2(1), 24–31 (2015)Google Scholar
  9. 9.
    Ranjith, Venkateswara Reddy, L.: Threats –Solutions in Cloud security, Recent and Innovation Trends in Computing and Communication (IJRITCC)Google Scholar
  10. 10.
    Ranjith, Venkateswara Reddy, L.: An improved cryptographic mechanism for cloud storage system. Int. J. Appl. Eng. Res. (Accepted for its publication)Google Scholar
  11. 11.
    Perry Groot, M.O., Bruijsten, F.: Patient data confidentiality issues of the dutch electronic health care record. In: Proceedings of the 19th Belgian-Dutch Conference on Artificial Intelligence (BNAIC), pp. 151–157 (2007)Google Scholar
  12. 12.
    Salih, R.M., Lilien, L., Othmane, L.B.: Protecting patients electronic health records using enhanced active bundles. In: Proceedings of the 6th International Conference on Pervasive Computing Technologies for Healthcare, Doctoral Consortium, pp. 1–4 (2012)Google Scholar
  13. 13.
    Ben Othmane, L.: Active bundles for protecting confidentiality of sensitive data throughout their lifecycle. Ph.D. dissertation, Kalamazoo, MI, USA, aAI3441001 (2010)Google Scholar
  14. 14.
    Ranchal, R.: Cross-domain data dissemination and policy enforcement. Ph.D. dissertation, West Lafayette, IN, USA (2015)Google Scholar
  15. 15.
    Moore, P.L.: Taming the beast. 2006/2007 physicians practice technology guide. Physicians Practice, pp. 7–10 (2006)Google Scholar
  16. 16.
    Amazon, E.C.: Amazon Web Services EC2 instance types. (2014). Accessed 10 Feb 2017, Accessed 21 Nov 2016

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of CSERayalaseema UniversityKurnoolIndia
  2. 2.Department of ITSree Vidyanikethan Engineering CollegeChittoorIndia

Personalised recommendations