Abstract

Cloud based intelligent health monitoring system (CIHMS) is smart equipment which facilitates the patients to repossess the health care information without going to the hospital. By recording the health care information of the patients in the cloud environment, this could be attained. Nevertheless, while coming to the part of security of healthcare information is a difficult issue. Cloud computing gives a means of storing and distributing the huge amount of data’s from the several users. Storing and distributing data contents via third party server will bring about more security problems. The care should be taken on those contents that are dealing via the cloud storage and the illegal access made by malevolent users must be observed and retracted. In the previous research, Bi-directional storage verification in cloud storage (BD-SVCS) is presented for the cloud environment that will validate each user beforehand giving them authentication. Nevertheless, this technique still found to be short of the safe and competent authentication. Here encryption information could be hacked simply. These issues are eliminated in the proposed methodology called scalable and enhanced key-aggregate cryptosystem (SE-KAC), in which the safe and consistent dealing of data contents is guaranteed. It gives competent security for healthcare information. This technique deals with the issue of outflow of sensitive information and implements a safe CIHMS for giving the security of the related parties and their data. By utilizing this technique, the patient and healthcare institutions could record the health and medical prescription data in encrypted format. For encryption, the double encryption technique with cipher text id known as classes for enhancing the security. The key owner contains a master secret key which is utilized to extract the secret keys for various classes. The extracted key is accumulated and forwards as a single aggregate key to the patient for the purpose of decryption. In addition, unique data shared by numerous users are found out that would be given via the similar set of resources with the intention of evading the annoying resource wastage. This is accomplished by taking the similar data contents needed by the users in the identical virtual machine. An experimental result proves that proposed research methodology SE-KAC attains higher security and less complexity.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call