• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 200
Next 10 →

VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data

by Qingji Zheng, Shouhuai Xu
"... Abstract—It is quite common nowadays for data owners to outsource their data to the cloud. Since the cloud is not fully trusted, the outsourced data should be encrypted, which however brings a range of problems, such as: How can the authorized data users search over a data owner’s outsourced encrypt ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
attribute-based keyword search (VABKS). This solution allows a data user, whose credentials satisfy a data owner’s access control policy, to (i) search over the data owner’s outsourced encrypted data, (ii) outsource the tedious search operations to the cloud, and (iii) verify whether the cloud has

Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

by Nikita Uttarwar, Prof Shikha Pacholi
"... Abstract — With the growing popularity of cloud computing, organizations and data owners starts to outsource their important data to the public cloud for reduced management cost and ease of access. Encryption helps to protect user data confidentiality, it makes difficult to perform secure plain text ..."
Abstract - Add to MetaCart
text search over the encrypted data. In this paper, we present some combination between verifiable computation and encrypt-then-Mac mechanism. To support the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time

Attribute-Based Encryption for Reliable and Secure Sharing of PHR in Cloud Computing

by Ajay Kumar
"... Abstract — In this paper we investigating on Personal health record (PHR),which is a patient-centric model of health information exchange, and is stored at a third party i.e., cloud providers. But there are concerns such as personal health information can be exposed to third party servers and to una ..."
Abstract - Add to MetaCart
to be the most significant dispute towards accomplishing fine-grained, cryptographically imposed data access control. Sequentially to have control for data access to PHRs stored in semi trusted severs, a novel patient-centric structure and a suite of methods is proposed in this paper. We leverage attribute-based

Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption

by Ming Li, Shucheng Yu, Yao Zheng, Student Member, Kui Ren, Senior Member, Wenjing Lou, Senior Member - IEEE Transactions on Parallel and Distributed Systems , 2012
"... Abstract—Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third p ..."
Abstract - Cited by 59 (2 self) - Add to MetaCart
and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme. Index Terms—Personal health records, cloud computing, data privacy, fine-grained access control, attribute-based

Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption

by Ming Li Member, Shucheng Yu, Yao Zheng, Student Member, Kui Ren, Wenjing Lou, Senior Member
"... Abstract—Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third p ..."
Abstract - Add to MetaCart
and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our proposed scheme. Index Terms—Personal health records, cloud computing, data privacy, fine-grained access control, attribute-based

Attribute-Based Encryption for Scalable and Secure Sharing of Personal Health Records in Cloud Computing

by Mr. Prasad P S, Dr. G F Ali Ahammed
"... Abstract:- Personal health record (PHR) is a patient-centric model of health information exchange, and is stored at a third party i.e., cloud providers. But there are concerns such as personal health information can be exposed to third party servers and to unauthorized parties. In order to assure th ..."
Abstract - Add to MetaCart
accomplishing fine-grained, cryptographically imposed data access control. Sequentially to have control for data access to PHRs stored in semitrusted severs, a novel patient-centric structure and a suite of methods is proposed in this paper. We leverage attribute-based encryption (ABE) practices to attain

Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption

by Sandhyarani Thatikayala , J Sravanthi , Asst Prof
"... Abstract: Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third ..."
Abstract - Add to MetaCart
-grained and scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each patient's PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security

Improve Security of Attribute Based Encryption for Secure Sharing of Personal Health Records

by Able E Alias, Neethu Roy
"... Abstract- Cloud computing servers provides platform for users to remotely store data and share the data items to everyone. Personal health record(PHR)has emerged as a patient –centric model of health information exchange. Confidentiality of the shared data is the major problem when patients uses the ..."
Abstract - Add to MetaCart
Abstract- Cloud computing servers provides platform for users to remotely store data and share the data items to everyone. Personal health record(PHR)has emerged as a patient –centric model of health information exchange. Confidentiality of the shared data is the major problem when patients uses

Efficient and Secure Data Sharing in Cloud Storage by Using Encryption Techniques

by J Jayalakshmi , P Shanmuga Priya , 2015
"... Abstract Using cloud storage, users can remotely store their data and enjoy the ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical poss ..."
Abstract - Add to MetaCart
. This paper enables security in cloud using encryption key that is generated while uploaded files by the user. The random key is generated using random key generation algorithm. The user can transfer their files with the permission of the owner. Multikeyword ranked search over encrypted cloud data establish a

Implementation of Cloud Computing on Web Application

by Liladhar R. Rewatkar, Ujwal A. Lanjewar
"... Cloud computing is a new method to add capabilities to a computer without licensing new software, investing in new hardware or infrastructure or training new personnel. Applications are purchased, licensed and run over the network instead of users desktop. It provides common business applications on ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
online that are that are accessed from a web browser, while the software and data are stored on the servers. The web is a global hypertext system, has evolved into a distributed application platform, in which the application logic and user interface are two separate entities. As we move toward the cloud
Next 10 →
Results 1 - 10 of 200
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University