Research analysis on encryption algorithms for cloud authentication in Hms

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the advancement of Internet of Things, mutual sharing of data turns out to be simple among different brilliant gadgets over the globe. In such a situation, a smart health care should be accelerated with a goal to provide a secure patient’s record situated globally. In any case, as the sensitive data about a patient passes through an open channel (i.e., the Internet), there are odds of abusing this data and intercepting message communication and possibility of passive attack. These attacks are undetected and unavoidable over open channels. Thus, there is a necessity for a solid crypto system for safely handling keen human services information. To ensure that the patients' right over their own information, it is a assuring technique to scramble the information's by the time it gets re-appropriated. We are presenting a secure data retrieval scheme by comparing various algorithms that manage their attributes independently. The proposed application mainly insist on current attribute based encryption mechanism and providing compared efficiency.

Cite

CITATION STYLE

APA

Ananya, K., Khanam, J., & Santhosh Kumar, B. J. (2019). Research analysis on encryption algorithms for cloud authentication in Hms. International Journal of Recent Technology and Engineering, 8(2), 640–643. https://doi.org/10.35940/ijrte.B1032.078219

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free