As the key might be stolen along with the encrypted data. similarly, such a storage design will be vulnerable to privacy and trust issues. thus, we propose instead that each patient should generate her own decryption key, and use that key to encrypt her records. encryption schemes with strong security properties will. Its distributed structure protects the system from single-point attack or malfunction, supports distributed storage and prevents data catastrophes. all personal health records are stored in personal encrypted security accounts. the keys are kept by patients themselves or by delegates authorized by patients.. Scheme for secure sharing of personal health records using cloud computing (2016) the attribute based encryption (abe) technique is employed that during which the phr owner encrypts the data according to associate degree access policy which determines the potential users un agency are eligible to access..
To generate proxy re-encryption key for one-time data access. a proxy server will be created virtually for one time data access. we can achieve the symptoms based treatment by secure personal health record in cloud storage when applying the proposed encryption algorithm.. G. attribute based encryption in personal health records a centralized storage system with hierarchies was developed for sharing the phr [13]. phr is outsourced on the cloud service provider. building phr in the form of distributed storage stimulates the key management overhead. central authority (ca) could provide solutions to this problem.. The personal health records are maintained in a data server under the cloud environment. a novel framework of secure sharing of personal health records has been proposed in this paper. public and personal access models are designed with security and privacy enabled mechanism. the framework addresses the unique challenges brought by multiple phr.