User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 10
 Downloands 1
Maintenance of Personal Health Record System with Cipher text Policy Attribute-Based Encryption and Quick Decryption
2022
Journal:  
Turkish Journal of Computer and Mathematics Education
Author:  
Abstract:

The meteoric rise of information technology coupled with the pervasive use of cloud computing across all industries has prepared the road for the implementation of Personal Health Record (PHR) Systems using cloud computing. The greatest example to utilise is Microsoft Healthvault, which is an online personal health record service offered by the technology giant Microsoft. This service allows users to save, access, and update their personal information, which can then be shared with health care professionals. Some people believe that shifting applications that deal with personal data to cloud computing might result in a loss of control over the data. Therefore, it is essential to have PHR systems that are safe and stored on the cloud. Several frameworks for PHR have been developed, several of which make use of conventional cryptographic methods. However, they are not suitable for the PHR systems since they do not meet the requirements for efficiency, scalability, and appropriateness. Nicely addition, the single owner scenario of standard cryptographic approaches does not fit in with the multi-owner situation of the PHR system. As a result, we propose a PHR framework in which patients have access control and privacy of their personal record using a light weight 64 bit block cypher symmetric encryption algorithm. Additionally, we propose dividing the patient-centric framework into multiple security domains in order to reduce the complexity of key distribution. The plan that has been suggested is adaptable since it enables for break glass judgements to be made in the event of an emergency situation. However, the system does not have integrity, which is something that may be maintained by utilising a digital signature method or an Elliptic Curve Digital Signature Algorithm (ECDSA) scheme to establish integrity of the personal health information.

Keywords:

0
2022
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles












Turkish Journal of Computer and Mathematics Education

Journal Type :   Uluslararası

Metrics
Article : 1.706
Cite : 103
2023 Impact : 0.071
Turkish Journal of Computer and Mathematics Education