Integrity Check Mechanism for Personal Health Record in Cloud using SHA

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-5
Year of Publication : 2019
Authors : Mr. Subhash C S , Dr. C D Guruprakash , Dr. M Siddappa
DOI :  10.14445/22312803/IJCTT-V67I5P128

MLA

MLA Style:Mr. Subhash C S , Dr. C D Guruprakash , Dr. M Siddappa"Integrity Check Mechanism for Personal Health Record in Cloud using SHA" International Journal of Computer Trends and Technology 67.5 (2019):159-163.

APA Style: Mr. Subhash C S , Dr. C D Guruprakash , Dr. M Siddappa (2019) Integrity Check Mechanism for Personal Health Record in Cloud using SHA International Journal of Computer Trends and Technology, 67(5), 159-163.

Abstract
Cloud-based Personal Health Record structures (CB-PHR) have phenomenal potential in empowering the organization of individual prosperity records. Security and insurance concerns are among the rule obstacles for the wide gathering of CB-PHR structures. In this paper, we consider a multi-source CB-PHR system in which different data providers, for instance, crisis facilities and specialists are endorsed by individual data owners to exchange their own prosperity data to an untrusted open cloud. The prosperity data are submitted in an encoded structure to guarantee information security, and every datum supplier likewise submits encoded information files to empower request over the mixed data. We propose a novel trustworthiness check component in haze of individual wellbeing records utilizing secure hash calculation whereby the cloud can combine the scrambled information lists from numerous information suppliers without realizing the list content. SHA empowers efficient and security safeguarding question handling in that an information client can present a solitary information inquiry the cloud can process over the encoded information from every single related datum supplier without realizing the inquiry content. We additionally propose an upgraded plan, SHA, to more efficiently bolster the information inquiries by progressive information suppliers.

Reference
[1] Shantala C P, Anil Kumar, ?Integrity Check Mechanism in Cloud using SHA-512 Algorithm?, IJECS 2014.
[2] Xin Yao, Yaping Lin, ?Privacy-preserving Search over Encrypted Personal Health Record in Multi-Source Cloud?, DOI 2017.
[3] Cong Wang, Qian Wang, Kui Ren, ?Ensuring data storage security in cloud computing?, IEEE 2010
[4] O Rajitha, Murali Krishna, ?Secure dynamic data support and trusted third party auditor in cloud computing? ,International Journal of science & Engineering Rearch, Volume 4, Issue 10, October-2013.
[5] Garima, ?Ensuring data storage security in cloud using two way integrity check algorithm? ,International Journal of Advanced Research in Computer Science and Software Engineering , Volume 3, Issue 11, November-2013.
[6] Xuefeng Liu, Yuqing Zhang, Boyang Wang and Jingbo Yan, ?Mona: secure multi-owner data sharing for dynamic groups in the cloud? , IEEE transactions on parallel and distributed system, Volume 24, NO. 6, June- 2013.
[7] Kapila Sharma, Kavita Kanwar, Chanderjeet Yadav, ?Data Storage Security in Cloud Computing?, International Journal of Computer Science and Management Research, Volume 2 Issue 1 January 2013.
[8] C. Wang, B. Zhang, K. Ren, J. Roveda, C. Chen, Z. Xu, ?A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing,? in INFOCOM’14, Toronto, Canada, 2014.
[9] J. Sun, X. Zhu, C. Zhang, Y. Fang, ?HCPP: Cryptography based secure ehr system for patient privacy and emergency healthcare,? in ICDCS’11, Minneapolis, Minnesota, 2011.
[10] M. Li, S. Yu, N. Cao, W. Lou, ?Authorized private keyword search over encrypted data in cloud computing,? in ICDCS’11, Minneapolis, Minnesota, 2011.
[11] J. Benaloh, M. Chase, E. Horvitz, K. Lauter, ?Patient controlled encryption: ensuring privacy of electronic medical records,? in: ACM workshop on CCS’09, New York, NY, 2009.
[12] M. Li, S. Yu, Y. Zheng, K. Ren, W. Lou, ?Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,? IEEE T Parall Distr., vol. 24, no. 1, pp. 131 – 143, 2013.
[13] M. Li, S. Yu, K. Ren, W. Lou, ?Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multiowner settings,? in SecureComm’10, Singapore, 2010.

Keywords
Authorization Query, Cloud Computing, Personal Health Record, Privacy-Preserving Query, Secure Hash Algorithm.