DOIONLINE

DOIONLINE NO - IJAECS-IRAJ-DOIONLINE-5386

Publish In
International Journal of Advances in Electronics and Computer Science-IJAECS
Journal Home
Volume Issue
Issue
Volume-3,Issue-8  ( Aug, 2016 )
Paper Title
Patient Health Record System Using Attribute Based Access Control Technique
Author Name
Abhineet Dubey, Anand Rajavat
Affilition
Department of computer science & engineering, svitsindore, India
Pages
73-79
Abstract
The cloud computing offers the efficient and scalable computing and storages, using this number of traditional and new generation applications are getting computational and storage benefits according their needs. In these applications sometime more sensitive and confidential data are communicated, thus the data owners are worried about the leakage of data or other privacy concerns. In addition of that in an organizational environment the similar authorities can access similar kinds of data with the similar access rights. But it is required to provide the functionality to incorporate the user defined privileges for securing the data confidentiality. This in this presented work the access control techniques and the security concern are studied. The proposed work involves the addressing of problem using a PHR (patient health record) system. In this PHR system three different kinds of users are implemented namely patient, researcher and doctor. Additionally for regulating the access of the users to the data an ABAC (attribute based access control) technique is presented. The presented technique provides the cryptographic data security and access control using the hybrid cryptographic approach. To design the proposed ABAC model the tiger hash generation algorithm and the blowfish cryptographic algorithm is proposed and implemented. The implementation of the proposed methodology is given using JAVA technology. Additionally for deployment of the implemented technique the OpenShift cloud platform is used. Finally for comparison of the cryptographic technique a SHA1 and DES algorithm based model is compared with the proposed model using the encryption and decryption time and space complexity. According to the gained experimental outcomes the proposed technique found efficient as compared to traditional cryptographic model. Keywords— PHR, access control, cryptography, implementation, ABAC models.
  View Paper