E-Health Care Solutions Using Anonymization



Similar documents
Multi Layered Securing of Health Records using Public and Private Model in Cloud

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Privacy Preserving Public Auditing for Data in Cloud Storage

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

ADVANCE SECURITY TO CLOUD DATA STORAGE

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Improving data integrity on cloud storage services

Secure Cloud StorageForPrivacy-Preserving Public Audit

Privacy in Electronic Health Care System Using Public and Private Cloud

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Near Sheltered and Loyal storage Space Navigating in Cloud

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Public Auditing for Shared Data in the Cloud by Using AES

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Cloud Data Storage Services Considering Public Audit for Security

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Cloud Server Storage Security Using TPA

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

A Secure and Dependable Cloud Storage Service in Cloud Computing

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

To Provide Security & Integrity for Storage Services in Cloud Computing

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Trusted Public Auditing Process for Secure Cloud Storage

International Journal of Advance Research in Computer Science and Management Studies

A Secure Decentralized Access Control Scheme for Data stored in Clouds

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

Journal of Electronic Banking Systems

Cloud Data Storage Security and Public Auditing

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

How To Ensure Data Integrity In Cloud Computing

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Selective dependable storage services for providing security in cloud computing

Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit Ability

Analysis of Secure Cloud Data Sharing Within a Group

Semi-Trusted Authentication for Health Data in Cloud

Identifying Data Integrity in the Cloud Storage

Enable Public Audit ability for Secure Cloud Storage

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Data Integrity by Aes Algorithm ISSN

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

Data Security & Availability in Multi-Cloud Storage with Cooperative Provable Data Possession

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Data Storage Security in Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Cryptographic Data Security over Cloud

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

Data Grid Privacy and Secure Storage Service in Cloud Computing

International Journal of Advance Research in Computer Science and Management Studies

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Secure Data Sharing in Cloud Computing using Hybrid cloud

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment

Data management using Virtualization in Cloud Computing

Secure Way of Storing Data in Cloud Using Third Party Auditor

Surveying Cloud Storage Correctness using TPA with BLS

How To Ensure Correctness Of Data In The Cloud

Survey Paper on Integrity Auditing of Storage

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server

Secure cloud access system using JAR ABSTRACT:

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

Data Integrity Check using Hash Functions in Cloud environment

Implementation of Data Sharing in Cloud Storage Using Data Deduplication

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

Verifying Correctness of Trusted data in Clouds

Secure Privacy Preserving Public Auditing for Cloud storage

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

Application Based Access Control on Cloud Networks for Data Security

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

A Review on Privateness-Retaining Public Auditing for Secure Cloud Storage

How To Ensure Data Integrity In Clouds

A Survey on Secure Auditing and Deduplicating Data in Cloud

Transcription:

E-Health Care Solutions Using Anonymization Chaitra.S 1, Narasimha Murthy M S 2 M.Tech Scholar, CS&E, Acharya Institute of Technology, Bengaluru, India 1 Assistant Professor, CS&E, Acharya Institute of Technology, Bengaluru, India 2 Abstract: Cloud computing is a type of computing, instead of having local servers or personal devices to handle applications it trusts on sharing computing resources. Cloud services can help the healthcare industry to access and manage health records effectively in order to provide better patient care. A properly implemented cloud storage system allows hospitals to process tasks effectively and quickly, without causing a drop in performance. This paper mainly focuses on security concerned privacy data enhancement in the cloud environment.. One of the privacy preserving techniques called Anonymization is used, which removes identifying attributes from the database and making the data identification difficult to anybody except the data owners. In this project L-Diversity Technique is used for the Anonymization of the Patient data. the system proposes to integrate key management from pseudorandom number generator for unlink ability, a secure indexing method for privacy preserving keyword search which hides both search and access patterns based on redundancy. Keywords: Anonymization, Cloud Computing, Data Storage Protection, Privacy Preserving, Security, Shared Data,Data Identification,L-Diversity Technique. I. INTRODUCTION The data is stored into cloud by cloud customers to enjoy the high quality networks, servers, services and applications from a shared pool of configurable computing resources. Advantages of cloud computing ubiquitous network access, transference of risk, location independent resource pooling. Sensitive data example personal health records may have to be encrypted by data owners before outsourcing to the commercial public cloud to protect data privacy and combat unsolicited accesses in the cloud and beyond. Usersshare information in the cloud. Some purpose public or private organizations publish their database on the cloud for research purpose. This database may contain sensitive information about many people. The Hospital tracks its patients with help of this database. The privacy of this data must be preserved while disclosing it to third party or while placing it in long time storage. i.e. any sensitive information should not be disclosed [02]. In recent forefront of new technologies the patient records are being put in electronic format enabling patients to access their records via the Internet and also cloud computing environment. The remote patient is monitoring with more feasible at anytime, anywhere and any place also. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In the cloud Storage Data sharing is important functionality. How efficiently, securely and flexibly share data with others in cloud storage is shown in [01]. According to government website around 8 million patient s information was leaked in the past two years. The costs of healthcare services rise and healthcare professionals are becoming hard to find the information. The healthcare organizations are concerned with health information technology (HIT) systems. HIT allows health organizations to provide services in a more efficiently and cost-effectively manner. Computer systems are used extensively in medical and healthcare systems, over the past three decades. for the storage, documentation, presentation of patients information storage devices and storage [06]. Most of the medical records are being stored in the form of electronic records in centralized databases. Cloud is divided into three types based on internally (private Cloud), outsourced (public Cloud) or a combination of the two (hybrid Cloud). E-Health Cloud is concerned with a Service-Based Applications and Gateway. Cloud based HIT solutions used for patients Details. Patient record contains sensitive information for example drug usage, patient disease etc. [08]. One of the privacy preserving techniques that manipulate the information, making the data identification difficult to anybody except the owners is anonymization. It is different from that of data encryption. Anonymization of data removes identifying attributes like names or social securitynumbers from the database [02]. The salient features are offered by the system including efficient key management, especially for retrieval at emergencies, efficient key management and auditability, for misuse of health data. Specifically, the system proposes to integrate key management from pseudorandom number generator for unlink ability, a secure indexing method for privacy preserving keyword search which hides both search and access patterns based on redundancy. The proposed method seeks to develop privacy technology and privacyprotecting infrastructures to facilitate the development of a health information system so that individuals can actively protect their personal information [13]. Privacy is the right of an individual to determine for themselves when, how and to what extent information about them is shared or transfer to others. Recently, health Copyright to IJARCCE DOI 10.17148/IJARCCE.2015.4591 417

information of hundreds of thousands of patients has been made liable to danger due to security lapses at hospital and government agencies [03]. Privacy-preserving health data storage is studied by Sun et al, where patients encrypt their own health data and store it on a third-party server [base paper]. Advantages of cloud computing ubiquitous network access, transference of risk, location independent resource pooling. To protect data privacy and combat unsolicited accesses in the cloud and beyond, sensitive data example personal health records may have to be encrypted by data owners before outsourcing to the commercial public cloud [04]. Major cloud infrastructure providers, such as Amazon, Google, and Microsoft, more and more third-party cloud data service providers are emerging which dedicate to offer more accessible and user friendly storage services to cloud customers. Secondly, to protect data privacy and combat unsolicited accesses in the cloud and beyond, sensitive data, e.g., personal health records,emails, financial transactions, tax documents, etc., may have to be encrypted by data owners before outsourcing to the commercial public cloud this, however, obsoletes the traditional data utilization service based on plaintext keyword search. The trivial solution of downloading all the data and decrypting locally is clearly impractical, due to the huge amount of bandwidth cost in cloud systems [09]. The burden of local data storage and maintenance is created by the Security problems in cloud computing. By utilizing, public auditability [11] the users can resort to an external audit party to the integrity of outsourced data when needed. The TPA s audit process should not bring any new vulnerability towards user data privacy and should not increase the burden of the user.to overcome these disadvantages and to introduce a secure cloud storage with aauditing [5]. Some early works on privacy protection for e-health data concentrate on the framework design, including the demonstration of the significance of privacy for e-health systems. Secret sharing is a mechanism for sharing secret information among multiple entities so that the cryptographic power is distributed which at the same time avoid single point of failure. For (k, n) threshold secret sharing, a piece of information I is divided into n pieces, such that knowledge of any k or more of these pieces can recover information I, while knowledge of (k 1) or fewer pieces keeps information I completely undetermined. K.Yang and X.Jia presented a TSAS: Third Party Storage Auditing Services. Traditionally, owners can verify the data integrity predicated on two-party storage auditing protocols. In cloud storage system, however, it is unfavorable to let either side of cloud service providers or owners conduct such auditing, because none of them could be ensured to provide impartial auditing result. In TSAS, both the Data Fragment Technique and Homomorphic Verifiable Tags are applied to improve the performance [07]. Rana.M.Pir presented a Data Integrity Verification in Cloud Storage without using Trusted TPA. TTPA is a reliable independent component which is trusted by both the cloud users and server many researchers recommend the support of trusted third party (TTP). But issues such as TTP becoming bottleneck, data leakage, introduction of new vulnerabilities, scalability, accountability, performance overhead, dynamic data support, extra hardware cost incurred etc[10]. II. LITERATURE SURVEY Some early works on privacy protection for e-health data concentrate on the framework design, including the demonstration of the significance of privacy for e-health systems. Secret sharing is a mechanism for sharing secret information among multiple entities so that the cryptographic power is distributed which at the same time avoid single point of failure. For (k, n) threshold secret sharing, a piece of information I is divided into n pieces, such that knowledge of any k or more of these pieces can recover information I, while knowledge of (k 1) or fewer pieces keeps information I completely undetermined. Yue Tong, Jinyuan Sun, Sherman S. M. Chow, and Pan Li[13], proposed to build privacy into mobile health systems with the help of the private cloud. We provided a solution for privacy-preserving data storage by integrating a PRF-based key management for unlinkability, a search and access pattern hiding scheme based on redundancy, and a secure indexing method for privacy-preserving keyword search. We also investigated techniques that provide access control (in both normal and emergency cases) and auditability of the authorized parties to prevent misbehavior, by combining ABE-controlled threshold signing with role-based encryption. Privacy preservation of sensitive information is a key factor. Anonmization offers more privacy options rather to other privacy preservation techniques (Randomization, Encryption, and Sanitization). However, Anonmization itself contains several techniques that require concluding best one[14]. According to the presented analysis there is close competition among K- Anonymity, L-Diversity, T- Closeness, P-Sensitive and M-invariance. Analytical comparative analysis is conducted to select optimal Anonymization methods. Privacy-preserving health data storage is studied by Sun et al.,[11] where patients encrypt their own health data and store it on a third-party server. The backup mechanisms for emergency access rely on someone or something the patient trusts whose availability cannot be guaranteed at all times. Moreover, the storage privacy proposed in this paper is a weaker form of privacy because it does not hide search and access patterns. It may be argued that medical information systems are subject to the same type of threats and compromises that plague general information systems, and that it does not require special attention from a research viewpoint[12]. D. Boneh and M. Franklin[15]. proposed a fully functional identity-based encryption scheme (IBE). The scheme has chosen cipher text security in the random oracle model assuming a variant of the computational Diffie Hellman problem. Copyright to IJARCCE DOI 10.17148/IJARCCE.2015.4591 421

ABE (Attribute-Based Encryption) has shown its promising future in fine-grained access control for outsourced sensitive data. Typically, data are encrypted by the owner under a set of attributes. The parties accessing the data are assigned access structures by the owner and can decrypt the data only if the access structures match the data attributes. SSE allows data owners to store encrypted documents on remote server, which is modeled as honest-but-curious party, and simultaneously provides away to search over the encrypted documents[8]. More importantly, neither the operation of outsourcing nor keyword searching would result in any information leakage to any party other than the data owner, thus achieving a sound guarantee of privacy. III. METHODOLOGY An extrinsic auditor to audit the user s outsourced data is supported without learning knowledge on the data content. Cloud computing components are classified as: (CS) Cloud User (CU) Cloud Service Provider (CSP) & Cloud Server Third party Auditor (TPA) Now let s get to know the component working for cloud computing in detail. A. Cloud User (CU) Cloud user has large amount of data files that is stored in the cloud. A user depends on the CS for cloud data storage and maintenance. They may also dynamically collaborate with the CS to access and update their stored data for various application purposes. B. Cloud Service Provider (CSP) & Cloud Server (CS) Services made available to users on demand via the Internet from a cloud computing provider's servers as opposed to being provided from a company's own onpremises servers. Cloud services are designed to provide simple, flexible access to applications, resources and services, and are fully handled by a cloud services provider. Cloud servers work in the same way as physical servers but the functions they provide can be very different. Instead of renting or purchasing physical servers, clients are renting for virtual server space when electing for cloud hosting. The key benefits of cloud servers: Flexibility and scalability Cost-effectiveness Ease of set up Reliability C. Third party Auditor (TPA) The third party auditor (TPA), who has expertise and capabilities that cloud users do not have and is trusted to assess the cloud storage service security when requested on behalf of the user. Users believe on the CS for cloud data maintenance and storage. They may additionally dynamically interact with the CS to access and update their stored data for various application purposes. The users may resort to TPA for ascertaining the storage security of their outsourced data, protect their data from TPA. However, due to their own benefits the CS might neglect to keep or deliberately delete rarely accessed data files which belong to ordinary cloud users when the cloud data storage based services are being provided. We assume the TPA, who is in the business of auditing, is independent and reliable, and thus has no incentive to collude with either the CS or the users during the auditing process. Advantages: and personnel. failures. Avoiding local storage of data. Reduction in the costs of maintenance, storage The chance of losing data is reduced by hardware Not cheating the owner. Here user needs to register himself to store the data in the cloud. When he successfully logs in, he can upload the data in the cloud. Then dataset is generated which is anonymized and encrypted in the cloud. In this module is used to send the auditor request to the TPA.if valid user can see the decrypted information. The detailed explanation is as shown in below modules with figure 1. Copyright to IJARCCE DOI 10.17148/IJARCCE.2015.4591 422

Account Registration Login Create patient dataset User or patient Anonymisation EMT Cloud Encrypt data and upload Download file Verify by TPA TPA Figure 1: Block Diagram for Proposed System. IV. IMPLEMENTATION A. User Registration In this user registration module contains the fields like Name, Username, Password, Confirm Password, Email-id and Mobile Number. In this user registration module all the fields must be filled otherwise an error message will display. User must register with the cloud then perform the remaining operation without registration can t perform the other operations so initially user register then go for the login. In the user registration form, user must enter the valid information otherwise user got the error message. If the user registered with the proper information or details then users can perform the remaining operations otherwise not. B. Login In this user login module, user must enter proper user name and password. User performs the further operations if any error in the user name and password error message should display to enter proper details. C. File Upload Once the user login successfully, now the user can create medical dataset with privacy fields and upload the created medical dataset into cloud. Once the user uploaded successfully display the message you have successfully uploaded the file. From the user uploaded medical dataset we need to generate dataset in such a way that only the fields which are containing privacy fields to be hidden. Now apply the anonymize technique to the datasets. For the anonymized datasets are encrypted by using DES algorithm. This encrypted datasets are stored into the cloud. D. File Download The user can perform download the dataset file if the user selected option has a download file. Once the user successfully downloads the dataset file from cloud then the dataset file is decrypted using DES algorithm. This decrypted dataset file is stored into the local system. E. Verification by the TPA In this module is used to send the auditor request to the TPA. Generation proof is done by the cloud server to generate a proof of data storage correctness. Verification is done by the TPA to audit the proof form the cloud server. F. User Authentication and Authorization Module This module contains all the information about the authenticated user. User without his/her username and password can t enter into the login if he/she is only the authenticated user then he/she can enter to his/her login and he/she can see the all the information related to the project which he/she is developing. This module uses Form Based Authentication & Authorization to make security. V. RESULTS The proposed method provides secured health data access. In this work, anonymizationis done using l-diversity techniques, which add more security for private data present in the dataset. Then the whole dataset is encrypted using DES technique. Now the private data is double encrypted. The TPA is used for purpose of the audition in the server. Using RSA does not give better results than DES. So DES is considered as good encryption technique when compared to RSA. Even though AES is more efficient encryption technique, it consumes more time for computation. Therefore, DES is added with anonymization technique in order to achieve efficient security and also to reduce the computation time. Only related user can decrypt the data and view the anonymized data. In this work, private data get double encrypted from anonymization and DES. From this work, performance towards security is more when compared with other techniques. The anonymized data is not accessible to all. Only few users closely related the data can access this private data. Copyright to IJARCCE DOI 10.17148/IJARCCE.2015.4591 423

VI. CONCLUSION The use of cloud computing is an important development in the world. Many IT businesses have started using cloud architecture because of its pay-as-you-go concept. Security is one most important factor that everyone thinks before uploading data s in the cloud. In this paper, we have proposed a combination of anonymization and encryption to enable securing of intermediate datasets. A privacy preserving searching algorithm is also proposed to identify which intermediate datasets are to be encrypted rather than encrypting all the intermediate datasets so as to enable cost effective security. Any dataset that is to be downloaded by the user, he should get verified by the TPA. REFERENCES 1. C.K.Chu, S. M. Chow, W.G.Tzeng, J. Zhou andr. H. Deng, Key- Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage,Volume 25, Issue 2,pp. 1-11, 2014. 2. A. Sakhare and S. Ganar, Anonymization: A Method to Protect Sensitive Data in Cloud, International Journal of Scientific & Engineering Research, Volume 25, Issue 2, pp. 1-11, 2013. 3. A.Omotosho, A Criticism of the Current Security, Privacy and Accountability Issues in Electronic Health Records, International Journal of Applied Information Systems, Volume 7, Issue 8, pp. 11-18, 2014. 4. V. R.Patil and A.C.Lomte, Challenges toward Achieving Privacy and Secure Searchable Outsource cloud data Storage Services,International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, Issue 11, pp. 400-403, 2013. 5. A.S.Anupriya, Ananthi and S.Karthik, TPA Based Cloud Storage Security Techniques,International Journal of Advanced Research in Computer Engineering & Technology,Volume 1, Issue 8, pp. 1-4, 2012. 6. K.P. Kulkarni and A.M.Dixit, Privacy Preserving System Using Attribute Based Encryption for e-health Cloud, International Journal of Science and Research, Volume 3 Issue 12, pp. 518-523, 2014. 7. Y. Zhu, G. J. Ahn, H. Hu, S. S. Yau,H. G. An, and C. J. Hu, Dynamic Audit Services foroutsourced Storages in Clouds, IEEE Transactions on Services Computing, Volume 6, Issue 2, pp. 227-237, 2013. 8. R. Curtmola, J. Garay, S. Kamara and R. Ostrovsky, Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions, 9. N. Cao, Secure and Reliable Data Outsourcing in Cloud Computing, 2012. 10. Y. Zhu, H. Wang, Z. Hu, G. J. Ahn, H. Hu and S. S. Yau, Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds, Association for computing resources,2011. 11. J.Sun,X.Zhu,C.Zhang,andY.Fang, HCPP:Cryptographybasedsecure EHR system for patient privacy and emergency healthcare, in Proc. IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2011, pp. 373 382. 12. G. Ateniese, R. Curtmola, B. de Medeiros, and D. Davis, Medical information privacy assurance: Cryptographic and system aspects, presented at the 3rd Conf. Security Commun. Netw., Amalfi, Italy, Sep. 2002. 13. Yue Tong, Jinyuan Sun, Sherman S. M. Chow, and Pan Li, Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability, IEEE journal of biomedical and health informatics, vol. 18, no. 2, march 2014 419. 14. Abdullah Abdulrhman AlShwaier, Dr, Ahmed Zayed Emam, Data Privacy On E-Health Care System, International Association of Scientific Innovation and Research. 15. D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing. Extended abstract in CRYPTO 2001, SIAM J. Comput., vol. 32, no. 3, pp. 586 615, 2003 Copyright to IJARCCE DOI 10.17148/IJARCCE.2015.4591 424