Aim: to systematically construct a secure and privacy preserving e-health cloud system, so that it is immune to the inference attack and runs efficiently. to protect the E-Healthcare data with fine-grained access control, the data can be either numerical or string value. Proposed system: proposed two-layer encryption scheme In the first-layer encryption, paper propose to define a specialized access policy for each data attribute in the EHR, generate a secret share or every distinct role attribute, and reconstruct the secret to encrypt each data attribute, which ensures a fine-grained access control, saves much encryption time, and conceals the frequency of role attributes occurring in the EHR. In the second-layer encryption, paper propose to preserve the privacy of role attributes and access policies used in the first-layer encryption. Specifically, merge the first-layer access policies, add noise to the merged access policy, and encrypt the first-layer access policies un...
Comments
Post a Comment