Multi-Authority Secure Database for Enabling Authorized Encrypted Search with Privacy Preserving on Healthcare Databases
Satish T. Pokharkar1, Manoj kumar Rawat2
1Satish Pokharkar*, Department of Computer Engineering, Oriental University, Indore, India.
2Dr. Manoj Kumar Rawat, Department of Computer Engineering, Oriental University, Indore, India.
Manuscript received on April 30, 2020. | Revised Manuscript received on May 01, 2020. | Manuscript published on May 30, 2020. | PP: 1671-1674 | Volume-9 Issue-1, May 2020. | Retrieval Number: A2483059120/2020©BEIESP | DOI: 10.35940/ijrte.A2483.059120
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Now a day’s in medical field number of application’s will develop for overcome the complexity of previous work. By using information technology and computer science provide various new techniques and medical equipment’s has improved digitalization in healthcare sector. In existing system much more advancement is providing to overcome the time and money of patients and perform exact treatments and store patient’s confidential records in securely but most important issues are security. To address the existing security issues to design and develop the proposed research work on security i.e. for patient’s confidential health data records in database servers. Existing work during data transmission can only protect the patient’s data records but they can’t stop the insider attacks. In proposed research work, first implement front end security with the help of keylogging technique, second to store patient’s confidential data in multiple data servers or chunks and to prevent the insider attacks and third and most important is access policy of search for encrypted data of multi-authority. The main contribution of this research work to assign patients data records in different chunks securely and applying the cryptosystems for security goals of a patient’s confidential records. Especially, proposed work advantages of SHA hashing technique to perform each and every user for access of particular data records. This research work explores secure data storage and sharing using proposed AES 128 encryption algorithm and Role Base Access Control (RBAC) for secure data access scheme for end user. This work also carried out backup server approach it works like proxy storage server for ad hoc data recovery for all distributed data servers.
Keywords: Wireless network, user data privacy, Paillier encryption, Multi-authority, encrypted data search, forward security, SHA Algorithm, Hashing Functions, ABE (Attribute Based Encryption) etc.
Scope of the Article: Wireless Network