In the present era of Information Technology, almost all big and small scale companies are moving towards cloud to store and manage the data. Cloud computing is a routine of deploying a structure of distant servers speed up on the Internet to store, oversee, and manage information, rather than a neighbourhood server or a PC. The purpose for cloud procurement is reduced cost, adaptability, regular access and refreshed programming. Nowadays, healthcare frameworks are adjusting computerized stages and ending up being more patient-centered and data driven. In this paper, we present a planning empowered intermediary re-encryption method to defeat the security issues. This Technique will allow only limited access rights to an authorized agent to access the records for a specific time period. This technique will use a searchable encryption and proxy Re-encryption technique.
CITATION STYLE
Vijayakumar, V., Priyan, M. K., Ushadevi, G., Varatharajan, R., Manogaran, G., & Tarare, P. V. (2019, June 15). E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption. Mobile Networks and Applications. Springer Science and Business Media, LLC. https://doi.org/10.1007/s11036-018-1060-9
Mendeley helps you to discover research relevant for your work.