Secure Sharing of Health Records in Cloud using ABE
Nithya .E1, TousifAhamed Nadaf2

1Nithya E, Associate Professor, Department of Computer Science, Dr. Ambedkar Institute of Technology, Bangalore (Karnataka), India.
2Tousfiahamed Nadaf, Department of Computer Science, Dr. Ambedkar Institute of Technology, Bangalore (Karnataka), India.
Manuscript received on 11 June 2013 | Revised Manuscript received on 17 June 2013 | Manuscript Published on 30 June 2013 | PP: 172-176 | Volume-3 Issue-1, June 2013 | Retrieval Number: A0939063113/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: In recent years, Personal health record (PHR) has emerged as a patient-centric model of health information exchange. This stands in contrast with the more widely used electronic medical record, which is operated by institutions (such as a hospital) and contains data entered by doctors or billing data to support insurance claims. Individual Patient is the owner of the PHR. The main purpose of a PHR is to provide accurate and complete summary of an individual’s medical history which is accessible online. Especially, each patient is promised the full control of his/her medical records and can share his/her health record with a wide range of users, including healthcare providers, family members or friends. PHR is often outsourced to be stored at a third party, such as cloud providers. To assure the patients’ control over the access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Heretofore, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation have remained, which are some of the most important challenges toward achieving fine-grained, cryptographically enforced data access control.
Keywords: Personal Health Record, Data Privacy, Attribute Based Encryption, Cloud Computing.

Scope of the Article: Cloud Computing