Affiliation:
1. Department of Computer Science and Engineering, Mepco Schlenk Engineering College, Sivakasi, (Tamilnadu), India
2. Department of Electronics and Communication Engineering, Mepco Schlenk Engineering College, Sivakasi, (Tamilnadu), India
Abstract
This study explores how Electronic Health Records (EHR) might be transformed in the context of the rapid improvements in cloud computing and IoT technology. But worries about sensitive data security and access management when it moves to large cloud provider networks surface. Even if they are secure, traditional encryption techniques sometimes lack the granularity needed for effective data protection. We suggest the Secure Access Policy – Ciphertext Policy – Attribute-based Encryption (SAPCP-ABE) algorithm as a solution to this problem. This method ensures that only authorized users may access the necessary data while facilitating fine-grained encrypted data exchange. The three main phases of SAPCP-ABE are retrieval and decoding, where the system verifies users’ access restrictions, secure outsourcing that prioritizes critical attributes, and an authenticity phase for early authentication. Performance tests show that SAPCP-ABE is a better scheme than earlier ones, with faster encryption and decryption speeds of 5 and 5.1 seconds for 512-bit keys, respectively. Security studies, numerical comparisons, and implementation outcomes demonstrate our suggested approach’s efficacy, efficiency, and scalability.
Reference27 articles.
1. Akinyele J.A. , Lehmann C.U. , Green M.D. , Pagano M.W. , Peterson Z.N.J. and Rubin A.D. , Self-protecting electronic medical records using attributebased encryption, Cryptology EPrint Archive, 2010.
2. Securing electronic medical records using attribute-based encryption on mobile devices;Akinyele;Proceedings of the 1st ACM workshop on Security and Privacy in Smartphones and Mobile Devices,2011
3. An identity attribute– based encryption using elliptic curve digital signature for patient health record maintenance;Athena;International Journal of Communication Systems,2018
4. Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications;Belguith;Future Generation Computer Systems,2020
5. Ciphertextpolicy attribute-based encryption;Bethencourt;2007 IEEE Symposium on Security and Privacy (SP ’07),2007