Abstract: Pall computing has surfaced as a revolutionary means of data sharing, enabling a vast number of individualities to pierce information over networks fleetly and efficiently. In surrounds similar as particular health record( PHR) systems, the traditional burden of carrying colorful paper documents for judgments has been soothed. rather, cases can upload their health records to PHR systems, granting them the capability to store, recoup, and widely partake their data with authorized parties, including musketeers, family, and healthcare providers. The necessity for precise access control in PHRs has urged a demand for encryption schemes able of enforcing fine- granulated access control.

Retired ciphertext policy trait- grounded encryption( HCP- ABE) is a promising result to this challenge by cache access control programs within ciphertext, by enhancing sequestration protection. Unlike before mechanisms where access control programs were frequently transferred along with ciphertext, facing a threat to druggies' sequestration, HCP- ABE embeds the access structure directly into the ciphertext. This prevents unequivocal exposure of sensitive attributes similar as" cardiologist" or" central sanitarium" contained within access programs, which could unintentionally reveal a case's medical condition to unauthorized druggies.

While the preface of HCP- ABE addresses sequestration enterprises, being schemes aren't without limitations. numerous of these schemes support only introductory sense gates similar as AND gates or combinations of positive, negative, and wildcard attributes. Accordingly, two significant downsides arise an increase in the size of public parameters commensurable to the number of attributes, and a substantial rise in decryption costs. To alleviate these issues, low- overhead schemes have been proposed. These schemes generally incorporate decryption tests involving the addition of spare factors to ciphertext before decryption. While this approach enhances decryption effectiveness, it also results in a significant increase in ciphertext length, potentially hindering overall performance.

Sweats to optimize encryption schemes for PHRs must strike a balance between security and effectiveness. The exploration and development are necessary to address scalability and performance enterprises while icing strict access control and sequestration preservation. By these challenges, pall computing technologies can continue to transfigure data operation practices, particularly in sensitive disciplines like healthcare, fostering trust and confidence among druggies and easing wide relinquishment.

 TERMS : Personal Health Records(PHR),Attribute-Based Encryption, Hidden Policy, Fast Decryption


PDF | DOI: 10.17148/IJARCCE.2024.134119

Open chat
Chat with IJARCCE