E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption

41Citations
Citations of this article
63Readers
Mendeley users who have this article in their library.

Abstract

In the present era of Information Technology, almost all big and small scale companies are moving towards cloud to store and manage the data. Cloud computing is a routine of deploying a structure of distant servers speed up on the Internet to store, oversee, and manage information, rather than a neighbourhood server or a PC. The purpose for cloud procurement is reduced cost, adaptability, regular access and refreshed programming. Nowadays, healthcare frameworks are adjusting computerized stages and ending up being more patient-centered and data driven. In this paper, we present a planning empowered intermediary re-encryption method to defeat the security issues. This Technique will allow only limited access rights to an authorized agent to access the records for a specific time period. This technique will use a searchable encryption and proxy Re-encryption technique.

Cite

CITATION STYLE

APA

Vijayakumar, V., Priyan, M. K., Ushadevi, G., Varatharajan, R., Manogaran, G., & Tarare, P. V. (2019, June 15). E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption. Mobile Networks and Applications. Springer Science and Business Media, LLC. https://doi.org/10.1007/s11036-018-1060-9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free