Call For Paper Volume:4 Issue:8 Aug'2017 |

Compact Key based Client Control Mechanism for Cloud Environment

Publication Date : 21/04/2015

Author(s) :

M. Pandi , C. Manikandan , S. Velliangiri, ME (Ph.D), Professor/CSE .

Volume/Issue :
Volume 2
Issue 4
(04 - 2015)

Abstract :

Cloud environment is used to share data between the clients. Data owner maintains the shared data under cloud data centers. Semi-trusted third party servers are used to manage medical records. Personal Health Record (PHR) is used to manage patient personal and diagnosis details. PHR service allows a patient to create, manage and control their personal health data in one place through the web. Patient data can be shared with healthcare providers, family members and friends. Sensitive details are managed in medical records. Data owner decides the access privileges for the medical records. The common key management mechanism supports constant cipher text with common decryption process for all users. One can aggregate any set of secret keys and make them as compact as a single key. The secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. The key aggregation system is divided into five major steps. They are Setup, KeyGen, Encrypt, Extract and Decrypt. The setup process is designed to creating an account on an untrusted server by the data owner. The keygen process is executed by the data owner to randomly generate a public/master-secret key pair. Encrypt process is executed by anyone using public key and index value. Extract is carried out by the data owner for delegating the decrypting power for a certain set of ciphertext classes to a delegate. Decrypt is executed by a delegate who received an aggregate key KS generated by Extract. Patient controlled encryption scheme is designed using Key Aggregate cryptosystem (KAC). The cloud security system is improved with unlimited user access levels. The system is improved with device independent key distribution mechanism. The key distribution process is enhanced with security features to protect key leakage. The key parameter transmission process is integrated with the ciphertext download process.

No. of Downloads :



Web Design MymensinghPremium WordPress ThemesWeb Development

Compact Key based Client Control Mechanism for Cloud Environment

April 18, 2015