A Methodology for Secure Sharing of Personal Health Records in the Cloud

Akash Tamhane, Rishabh Panday, Supriya Sunkarwar, Ajay Kavhale, Rina Jugale


In the health care sector has resulted in value effective and convenient exchange of non-public Health Records (PHRs) among many taking part entities of the e-Health systems. still, storing the confidential health data to cloud servers is prone to revelation or larceny and demand the event of methodologies that make sure the privacy of the PHRs. Therefore, we tend to propose a technique referred to as SeSPHR for secure sharing of the PHRs within the cloud. The SeSPHR theme ensures patient-centric management on the PHRs and preserves the confidentiality of the PHRs. The patients store the encrypted PHRs on the un-trusted cloud servers and by selection grant access to differing types of users on totally different parts of the PHRs. A semi-trusted proxy referred to as Setup and Re-encryption Server (SRS) is introduced to line up the public/private key pairs and to supply the re-encryption keys. Moreover, the methodology is secure against business executive threats and conjointly enforces a forward and backward access management. Moreover, we tend to formally analyze and verify the operating of SeSPHR methodology through the High Level Petri Nets (HLPN). Performance analysis concerning time consumption indicates that the SeSPHR methodology has potential to use for firmly sharing the PHRs within the cloud. conjointly we tend to Implement as a contribution during this paper time Server, Secure Auditing Storage, in Time Server PHR Owner add the start and Ending time attach to uploaded Encrypted files, and conjointly implement the TPA Module for verify the PHR Record its hack or corrupted for the other hacker and wrongdoer if information hack from hacker facet discover all system details of wrongdoer like Macintosh Address and information science Address its our contribution in our project.


Full Text:



K. Gai, M. Qiu, Z. Xiong, and M. Liu, “Privacy - preserving multi-channel communication in Edge-of-Things,” Future Generation Computer Systems, 85, 2018, pp. 190-200.

K. Gai, M. Qiu, and X. Sun, “A survey on FinTech,” Journal of Network and Computer Applications, 2017, pp. 1-12.

A. Abbas, K. Bilal, L. Zhang, and S. U. Khan, “A cloud based health insurance plan recommendation system: A user cen-tered approach, “Future Generation Computer Systems, vols. 43-44, pp. 99-109, 2015.

A. N. Khan, ML M. Kiah, S. A. Madani, M. Ali, and S. Sham-shirband, “Incremental proxy re- encryption scheme for mo-bile cloud computing environment,”The Journal of Supercom- puting,Vol. 68, No. 2, 2014, pp. 624-651.

A. Abbas andS. U. Khan, “A Review on the State-of-the-Art Privacy Preserving Approaches in E-Health Clouds,” IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 4, pp. 1431-1441, 2014.


  • There are currently no refbacks.