*Five Years Citation in Google scholar (2016 - 2020) is. 1451*   *    IJPR IS INDEXED IN ELSEVIER EMBASE & EBSCO *       

logo

INTERNATIONAL JOURNAL OF PHARMACEUTICAL RESEARCH

A Step Towards Excellence
Published by : Advanced Scientific Research
ISSN
0975-2366
Current Issue
No Data found.
Article In Press
No Data found.
ADOBE READER

(Require Adobe Acrobat Reader to open, If you don't have Adobe Acrobat Reader)

Index Page 1
Click here to Download
IJPR 9[3] July - September 2017 Special Issue

July - September 9[3] 2017

Click to download
 

Article Detail

Label
Label
Privacy-PreservingCloud-AssistedSecure Authentication For E-Health Medical Data Maintenance

Author: DR.C.MENAKA , PRAVEEN KUMAR V
Abstract: In cloud medical records handling profound, the sensitive data is known as electronic medical records. Privacy and security issues are posed by storing and exchanging them with public or private cloud service providers. Cloud systems include firewall protection and systems for intrusion detection. To guarantee confidentiality, access control and end-to - end encryption is available. However, with the help of Man in the middle attacks and vulnerabilities of the storage systems, when sending data to the cloud system, attackers can catch the data. In order to solve these problems, the key distributor and end-to - end hybrid encryption was innovatively used in the middleware architecture proposed in this report. The developed middleware system processes queries created from patient, medical staff or researcher roles. Writing and modifying requests are encrypted asymmetrically in this scheme, and reading requests are symmetrically encrypted. The proposed approach is distinguished from previous research by this solution. The system's operating efficiency is improved according to this asymmetric encryption solution. Moreover, in a cyber-attack, the attacker cannot see the actual data because the confidential data is innovatively transmitted according to user roles to users with their private key via the key distributor method. This result demonstrates that EMR entry, writing and updating was carried out in compliance with the standards of security and privacy.
Keyword: privacy-preserve, cloud data, authentication, security, e-health, medical databases
DOI: https://doi.org/10.31838/ijpr/2020.12.04.519
Download: Request For Article
 
Clients

Clients

Clients

Clients

Clients
ONLINE SUBMISSION
USER LOGIN
Username
Password
Login | Register
News & Events
SCImago Journal & Country Rank

Terms and Conditions
Disclaimer
Refund Policy
Instrucations for Subscribers
Privacy Policy

Copyrights Form

0.12
2018CiteScore
 
8th percentile
Powered by  Scopus
Google Scholar

hit counters free