T.Radhika et al , International Journal of Computer Science and Mobile Computing, Vol.3 Issue.1, January- 2014, pg. 452-456
© 2014, IJCSMCAll Rights Reserved 452
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X
IJCSMC, Vol. 3, Issue. 1, January 2014, pg.452 – 456
SURVEY ARTICLE
SURVEY ON USER REVOCATION AND
FINE GRAINED ACCESS CONTROL OF
PHR IN CLOUD USING HASBE
T.Radhika
1
, S.Vasumathi Kannagi
2
1
PG Scholar, Computer Science and Engineering & Anna University, India
2
Assistant Professor, Computer Science and Engineering &Anna University, India
Radhikaa216@gmail.com; Vasumathi.arun@gmail.com
Abstract-Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since
this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing
security and privacy concerns on outsourced data. Several schemes employing Attribute-Based Encryption (ABE) have been
proposed for access control of outsourced data in cloud computing, however, most of them suffer from inflexibility in
implementing complex access control policies. The proposed scheme used is Hierarchical Attribute-Set-based encryption by
extending cipher text-policy Attribute-Set-Based Encryption (ASBE) with a hierarchical structure of users. The proposed
scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility and fine-grained access
control in supporting compound attributes of ASBE. In addition, ASBE employs multiple value assignments for access
expiration time to deal with user revocation more efficiently than existing schemes. We formally prove the security of
HASBE based on security of the Cipher text-Policy Attribute-Based Encryption (CP-ABE) scheme and analyze its
performance and computational complexity. We introduced the ASBE scheme for realizing scalable, flexible, and fine-
grained access control in cloud computing. The ASBE scheme seamlessly incorporates a hierarchical structure of system
users by applying a delegation algorithm to ASBE. ASBE not only supports compound attributes due to flexible attribute set
combinations, but also achieves efficient user revocation because of multiple value assignments of attributes.
Keywords: HASBE; Cloud Computing; PHR; User Revocation
I. INTRODUCTION
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often
outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal
health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over
access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy
exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important
challenges toward achieving fine-grained, cryptographically enforced data access control. Cloud computing is a new computing
paradigm that is built on virtualization, parallel and distributed computing, utility computing, and service-oriented architecture.