IRO Journals

Journal of Electronics and Informatics

Industrial Quality Prediction System through Data Mining Algorithm
Volume-3 | Issue-2

Comparative Analysis an Early Fault Diagnosis Approaches in Rotating Machinery by Convolution Neural Network
Volume-3 | Issue-2

Nakagami-m Fading Detection with Eigen Value Spectrum Algorithms
Volume-3 | Issue-2

Abstractive Summarization System
Volume-3 | Issue-4

Design of Adaptive Estimator for Nonlinear control system in Noisy Domain
Volume-3 | Issue-3

Automated Nanopackaging using Cellulose Fibers Composition with Feasibility in SEM Environment
Volume-3 | Issue-2

Comparative Analysis of Temperature Measurement Methods based on Degree of Agreement
Volume-3 | Issue-3

Transistor Sizing using Hybrid Reinforcement Learning and Graph Convolution Neural Network Algorithm
Volume-3 | Issue-3

A Review on Meshing Techniques in Biomedicine
Volume-3 | Issue-4

EL DAPP - An Electricity Meter Tracking Decentralized Application
Volume-2 | Issue-1

SMART STREET SYSTEM WITH IOT BASED STREET LIGHT OPERATION AND PARKING APPLICATION
Volume-1 | Issue-1

ENERGY AND POWER EFFICIENT SYSTEM ON CHIP WITH NANOSHEET FET
Volume-1 | Issue-1

Abstractive Summarization System
Volume-3 | Issue-4

A Review on Meshing Techniques in Biomedicine
Volume-3 | Issue-4

MIMO BASED HIGH SPEED OPTICAL FIBER COMMUNICATION SYSTEM
Volume-1 | Issue-2

Industrial Quality Prediction System through Data Mining Algorithm
Volume-3 | Issue-2

Comparative Analysis of Temperature Measurement Methods based on Degree of Agreement
Volume-3 | Issue-3

Transistor Sizing using Hybrid Reinforcement Learning and Graph Convolution Neural Network Algorithm
Volume-3 | Issue-3

VIRTUAL REALITY SIMULATION AS THERAPY FOR POSTTRAUMATIC STRESS DISORDER (PTSD)
Volume-1 | Issue-1

Comparative Analysis an Early Fault Diagnosis Approaches in Rotating Machinery by Convolution Neural Network
Volume-3 | Issue-2

Home / Archives / Volume-5 / Issue-4 / Article-2

Volume - 5 | Issue - 4 | december 2023

A Safe and Reliable Approach to Transfer Health Records using Searchable Key Proxy Re-Encryption
Dr. I. Parvin Begum  , Dr. S. Kalaivani, D. Nasreen Banu
Pages: 368-385
Cite this article
Begum, D. I. P., Kalaivani, D. S. & Banu, D. N. (2023). A Safe and Reliable Approach to Transfer Health Records using Searchable Key Proxy Re-Encryption. Journal of Electronics and Informatics, 5(4), 368-385. doi:10.36548/jei.2023.4.002
Published
10 November, 2023
Abstract

In the delivery of high-quality healthcare services, the exchange of computerized clinical data holds significant importance. To safeguard the confidentiality of client's sensitive information, it is imperative to adhere to stringent privacy and security regulations when sharing this data with others. Consequently, the adoption of proxy re-encryption servers serves as an effective and reliable means of transmitting computerized medical information. This encryption method is currently recognized as the sole approach that is both unidirectional and recursive, allowing third parties to modify encrypted ciphertext intended for one party so that it can be deciphered by another. This technique is referred to as proxy re-encryption. In order to empower patients with control over who can access their healthcare data, the system operates as an intermediary between them and a database server. Prior to transferring files to the information server, individuals who own them can utilize their keys to encrypt the files, thus ensuring the security of the data stored there. The test results demonstrate the system's proficiency in supporting secure data sharing. These proxy re-encryption mechanisms guarantee the confidentiality and accessibility of data, offering end-to-end security and privacy for electronically stored health information. While prioritizing patient privacy, the system aims to enhance collaboration among providers and facilitates data sharing between the sender and receiver using their respective keys. In this context, a unidirectional system operates in a one-way, providing a higher level of security, making it a suitable choice for untrusted environments where message transport is necessary without granting the receiver rights to respond to it.

Keywords

Proxy Re-Encryption Cryptography Healthcare Services Cipher Text Encryption Decryption Clinical Data

Full Article PDF
×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
For single article (Indian)
1,200 INR
Article Access Charge
For single article (non-Indian)
15 USD
Open Access Fee (Indian) 5,000 INR
Open Access Fee (non-Indian) 80 USD
Annual Subscription Fee
For 1 Journal (Indian)
15,000 INR
Annual Subscription Fee
For 1 Journal (non-Indian)
200 USD
secure PAY INR / USD
Subscription form: click here