CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS

Authors

  • Kuldeep Patil SKN SINHGAD INSTITUTE OF TECHNOLOGY SCIENCE KUSGAON (BK.), Lonavala
  • Jayant Shinde SKN SINHGAD INSTITUTE OF TECHNOLOGY SCIENCE KUSGAON (BK.), Lonavala
  • Avinash Suravase SKN SINHGAD INSTITUTE OF TECHNOLOGY SCIENCE KUSGAON (BK.), Lonavala
  • Kailash Hande SKN SINHGAD INSTITUTE OF TECHNOLOGY SCIENCE KUSGAON (BK.), Lonavala
  • Prof. Snehal Khartadd SKN SINHGAD INSTITUTE OF TECHNOLOGY SCIENCE KUSGAON (BK.), Lonavala

Keywords:

-

Abstract

Electronic health (e-health) record system could be a novel application that may bring nice convenience in
care. The privacy and security of the sensitive personal data is the major concern of the users, That may hinder more
development and wide adoption of the systems. The searchable cryptography (SE) theme could be a technology to
include security protection and favourable operability functions along, which can play a very important role within the ehealth record system. during this paper, we introduce a unique crypto graphical primitive named as conjunctive
keyword search with selected tester and temporal arrangement enabled proxy re-encryption perform (RedtPECK), which
could be a reasonably time-dependent searchable cryptography theme. It could enable patients to delegate partial access
rights to others to work search functions over their records during a restricted period. The length of the period for the
delegate to search and rewrite the delegators encrypted documents are often controlled. Moreover, the delegate might be
mechanically empty the access and search authority when a nominal amount of effective time. It can even support the
conjunctive keywords search and resist the keyword guesswork (KG) attacks. By the answer, only the selected tester is
ready to check the existence of bound keywords. We tend to formulate a system model and a security model for the
projected Re-dtPECK theme to show that it's Associate in Nursing economical theme verified secure within the
customary model. The comparison and intensive simulations demonstrate that it's an occasional computation and
storage overhead.

Published

2018-06-25

How to Cite

CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS. (2018). International Journal of Advance Engineering and Research Development (IJAERD), 5(6), 1-5. https://ijaerd.org/index.php/IJAERD/article/view/3604