Abstract

The E-Healthcare Cloud system has shown that it can improve healthcare quality as well as individual quality of life. Unfortunately, concerns about security and privacy prevent it from being widely adopted and used. Several studies have been carried out in order to protect the privacy of electronic health record (EHR) data. We start with a two-layer encryption scheme. We create first-layer encryption to ensure efficient and fine-grained access control over EHR data, in which we create a highly specialised access policy for each data attribute in the EHR and encrypt them individually with high efficiency. To protect the privacy of role attributes and access policies used in the first-layer encryption, we construct the second-layer encryption systematically. We made a recommendation. User revocation is commonly supported in such schemes, as users' group memberships may change for a variety of reasons. Prior to now, the computational overhead for Auto user revocation. Binary key generation is included for file storage. We proposed enabling file encryption alongside proxy re encryption.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call