Juni Khyat ISSN: 2278-4632 (UGC Care Group I Listed Journal) Vol-11 Issue-01 2021 Page | 823 DOI : 10.36893.JK.2021.V11I01.823-827 Copyright @ 2021 Authors INFORMATION FINE-GRAINED ACCESS CONTROL TO PHR IN CLOUD Mr. Sridhar Kavuri, Deputy Head, Department of Computer Science, P.B. Siddhartha College of Arts and Science, Vijayawada, Andhra Pradesh Email: sridharkavuri@pbsiddhartha.ac.in Mr. Sudhir Koneru, Assistant Professor, Department of Computer Science, P.B. Siddhartha College of Arts and Science, Vijayawada Email: sudheerkoneru79@gmail.com ABSTRACT: The proposed structure to build up the medical care part and to profit by the current e-government cloud computing stage Yasser, which is answerable for conveying shared services through an exceptionally proficient, dependable, and safe condition. This system plans to give health services and offices from the government to citizens (G2C). Besides, multifaceted candidate validation has been recognized and sealed in collaboration with two confided in specialists. Security examination and correlations with the related systems have been led. KEYWORDS: Health, ABE, PHR(Personal Health Record). 1] INTRODUCTION: This field includes gathering, overseeing, and utilizing biomedical data, from individual to worldwide levels. It improves the quality and effectiveness of medical care and the reaction to open health related crises [1]. In this pattern, a few innovative advances and new ideas, for example, wearable clinical gadgets, Body Area Networks (BANs), remote broadband correspondences and Cloud registering, are empowering progressed versatile medical care benefits that advantage the two patients and health experts [2]. Telemedicine guarantees an improvement of medical care administration quality in country, urban, thick and versatile regions. It gives another approach to convey health care services when the separation among specialist and patient is essentially away. Telemedicine can convey medical care services to the patient even in remote area. 2] LITERATURE SURVEY: Wang, Guojun, et al Be that as it may, when endeavor clients re- appropriate classified information for sharing on cloud workers, the embraced encryption framework ought uphold fine-grained access control, yet in addition give elite, full assignment, and versatility, to best serve the necessities of getting to information whenever and anyplace, designating inside undertakings, and accomplishing a unique arrangement of clients. In this paper, we propose a plan to help