Personal Health information is highly confidential. The Main objective is to find out the techniques to protect the health care data from unauthorized user in cloud. Due to privacy concern the personal data are need to be protected from third party and also from unauthorized user. In existing work they used cryptographic techniques like KP-ABE, Attribute based encryption, CP-ABE, etc. This paper addresses the challenges in each access control techniques, and its pros and cons. Future work is to overcome the challenges in existing techniques by using Keyless signature algorithm by using hash function.
CITATION STYLE
Charanya, R., Aramudhan, M., & Saravananaguru, R. K. (2016). A review on access control issues in ehealth application in cloud computing. Indian Journal of Science and Technology, 9(42). https://doi.org/10.17485/ijst/2016/v9i42/90536
Mendeley helps you to discover research relevant for your work.