Abstract

Key Aggregate Cryptosystem was used to construct a safe and scalable healthcare data exchange system in the cloud (KAC). KAC offered single-key encryption and decryption rights delegation for any group of ciphertexts utilizing an aggregated secret key. However, leakage of delegation keys and a specified bound on number of maximal ciphertext classes were major issues with KAC.The Scalable and Strengthened -KAC (SSKAC) approach was created to decide the number of ciphertext classes using an elliptic curve dynamically while simultaneously boosting the security level of KAC by utilising double encryption. Access control is crucial because the majority of healthcare data is extremely sensitive and should only be accessed by those who are permitted. As a result, SSKAC includes attribute-based access control with anonymous authentication to give access control on health data with anonymous authentication. However, the access policy may expose end-user privacy to an attacker. To tackle this problem,we used the cuckoo filter to disguise the right of entry policy tosafeguard the privacy information of the owner. The inference assault affects medical records. One of the strategies for ensuring data confidentiality from unforeseen data access is inference control. The Individual data privacy is secured through the use of two inference control methods; The Query Set Size Prevention and K-Anonymity.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call