Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i42/90536
Year: 2016, Volume: 9, Issue: 42, Pages: 1-5
Original Article
R. Charanya1* , M. Aramudhan2 and Ra. K. Saravananaguru1
1VIT University, Vellore - 632014, Tamil Nadu, India; [email protected], [email protected] 2PKIET, Karaikal - 609603, Pondicherry, India; [email protected]
*Author for correspondence
R. Charanya VIT University, Vellore - 632014, Tamil Nadu, India; [email protected]
Personal Health information is highly confidential. The Main objective is to find out the techniques to protect the health care data from unauthorized user in cloud. Due to privacy concern the personal data are need to be protected from third party and also from unauthorized user. In existing work they used cryptographic techniques like KP-ABE, Attribute based encryption, CP-ABE, etc. This paper addresses the challenges in each access control techniques, and its pros and cons. Future work is to overcome the challenges in existing techniques by using Keyless signature algorithm by using hash function.
Keywords: Access Control Models, Encryption Techniques
Subscribe now for latest articles and news.