首页> 外文期刊>Microprocessors and microsystems >Hap-Cp-Abe Based Encryption Technique With Hashed Access Policy Based Authentication Scheme For Privacy Preserving Of Phr
【24h】

Hap-Cp-Abe Based Encryption Technique With Hashed Access Policy Based Authentication Scheme For Privacy Preserving Of Phr

机译:基于HAP-CP-ABE的加密技术,具有基于哈希访问策略的基于验证方案,用于保护PHR的隐私保留

获取原文
获取原文并翻译 | 示例
           

摘要

As a novel abridged record of patients' medical data, PHR would be accessed online. Nevertheless, this very sensitive private information might be attained through illegal parties as of the cloud. Numerous existent algorithms utilized CP-ABE to protect the data as of unapproved users, however, it loses the high-efficiency against the conventional methods on account of the security parameters' requirement of large size. To surmount these issues, a HAP-CP-ABE-based encryption technique with HAP based authentication scheme intended for PHR is proposed. The proposed work encompasses '3' phases: (A) the authentication phase, which includes verification before the user uploads the PHR files. (B) Secure upload phase: initially, the features are all extracted as of the PHR files. Then, the features are lessened as of the extracted features utilizing ENT-LDA. Then, HAP will be created using SHA-512. Lastly, securely upload PHR to cloud utilizing HAP-CP-ABE. (C) In the secure download phase, primarily, the system corroborates the HAP for the requested user. If it is matched, then it permits them to access, or else the system declined permission. After authentication, the system permits the requested user to download the file. Extensive analysis along with investigational outcomes shows the proposed system's security together with efficiency.
机译:作为一种新颖的患者医疗数据的销布记录,PHR将在线访问。尽管如此,可能通过云的非法缔约方实现这一非常敏感的私人信息。许多存在的算法利用CP-ABE来保护数据保护数据,然而,由于安全参数的大尺寸的要求,它会对传统方法失去高效率。为了克服这些问题,提出了一种具有用于PHR的基于HAP的身份验证方案的基于HAP-CP-ABE的加密技术。所提出的工作包括“3”阶段:(a)认证阶段,包括在用户上传PHR文件之前的验证。 (b)安全上传阶段:最初,该功能都被提取为PHR文件。然后,将特征作为利用ENT-LDA的提取特征减少。然后,将使用SHA-512创建HAP。最后,安全地将PHR牢固地上传到云使用HAP-CP-ABE。 (c)在安全下载阶段,主要是系统证实了所请求用户的HAP。如果匹配,则允许它们访问,否则系统拒绝了许可。身份验证后,系统允许请求的用户下载该文件。随着调查结果的广泛分析显示,拟议的系统安全性以及效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号