An Access Control Mechanism to Establish a Robust Cloud Assisted E-health Care System

Ch. Kalyani, V. Purushothama Raju


This circumstance confronts security issues. The plan averts replay assaults and backings creation, change, and perusing information put away in the cloud we likewise address client renouncement. Additionally our verification and access control plan is decentralized and vigorous not at all like different access control plans which are centralized. The correspondence calculation and capacity overheads are practically identical to concentrated methodologies. Access control of information put away in cloud so that only approved clients with substantial traits can get access of the data. Our frame work verifies the legitimate clients, who store and retrieve, modify their information on the cloud. The character of the client is shielded from the cloud amid validation. Secure data in cloud like patients personal data, prescriptions data, lab reports etc., are accessed by authorized clients based on their access permissions given by the data owner. If client need any other extra permissions on the secure data first he ought to send request to trapdoor and get that permissions on the cloud for accessing.
Keywords: - Access control; e –health; privacy preserving; cloud computing

Full Text:


Copyright (c) 2015 Ch. Kalyani, V. Purushothama Raju

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


All published Articles are Open Access at 

Paper submission: