Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.8 Issue.4

Submission
Last date
31-Aug-2022
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-8,Issue-4. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  Timing Enabled Proxy Re-Encryption Function for E-Health Clouds with Designated Tester Using Conjunctive Keyword Search
PaperId: :  5097
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 3 Issue 3 2017
DUI:    16.0415/IJARIIE-5097
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
Aiman HasanPoojya Dodappa Appa College of Engineering
Dr. Rekha PatilPoojya Dodappa Appa College of Engineering

Abstract

M.tech in computer networks and engg
Proxy Re-encryption, time control, conjunctive keyword search, designated tester, e-health, resist offline keyword guessing attack.
An “ELECTRONIC HEALTH (E-HEALTH) RECORD SYSTEM” is the new and interesting application that will bring great amenity in healthcare system. Users basically have two major concerns related to their personal information like the privacy and security of the sensitive personal information, which might harm or obstruct further development. The searchable encryption (SE) theory incorporates security protection and favorable operability functions together, which can play an important role in the e-health record system. Our work aims at introducing a kind of a time-dependent SE scheme named Timing Enabled Proxy Re-Encryption Function for E-Health Clouds With Designated Tester Using Conjunctive Keyword Search. Proposed work enables patients to give the authority to others for partially accessing and working on their sensitive personal information for a limited period of time. The length of the time period for the authorized person to search and decrypt the data owner’s encrypted documents can be controlled. In addition, the authorized person will be automatically deprived of the access and search authority after the time period expires. Conjunctive keywords search is supported and also and resist the keyword guessing attacks. Only the specified/allotted tester is able to test the existence of certain keywords. Then, system model and a security model for the proposed scheme is designed to show that our work is efficient and it has a no computation and low storage overhead.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE Aiman Hasan, and Dr. Rekha Patil. "Timing Enabled Proxy Re-Encryption Function for E-Health Clouds with Designated Tester Using Conjunctive Keyword Search" International Journal Of Advance Research And Innovative Ideas In Education Volume 3 Issue 3 2017 Page 477-481
MLA Aiman Hasan, and Dr. Rekha Patil. "Timing Enabled Proxy Re-Encryption Function for E-Health Clouds with Designated Tester Using Conjunctive Keyword Search." International Journal Of Advance Research And Innovative Ideas In Education 3.3(2017) : 477-481.
APA Aiman Hasan, & Dr. Rekha Patil. (2017). Timing Enabled Proxy Re-Encryption Function for E-Health Clouds with Designated Tester Using Conjunctive Keyword Search. International Journal Of Advance Research And Innovative Ideas In Education, 3(3), 477-481.
Chicago Aiman Hasan, and Dr. Rekha Patil. "Timing Enabled Proxy Re-Encryption Function for E-Health Clouds with Designated Tester Using Conjunctive Keyword Search." International Journal Of Advance Research And Innovative Ideas In Education 3, no. 3 (2017) : 477-481.
Oxford Aiman Hasan, and Dr. Rekha Patil. 'Timing Enabled Proxy Re-Encryption Function for E-Health Clouds with Designated Tester Using Conjunctive Keyword Search', International Journal Of Advance Research And Innovative Ideas In Education, vol. 3, no. 3, 2017, p. 477-481. Available from IJARIIE, http://ijariie.com/AdminUploadPdf/Timing_Enabled_Proxy_Re_Encryption_Function_for_E_Health_Clouds_with_Designated_Tester_Using_Conjunctive_Keyword_Search_ijariie5097.pdf (Accessed : 06 February 2020).
Harvard Aiman Hasan, and Dr. Rekha Patil. (2017) 'Timing Enabled Proxy Re-Encryption Function for E-Health Clouds with Designated Tester Using Conjunctive Keyword Search', International Journal Of Advance Research And Innovative Ideas In Education, 3(3), pp. 477-481IJARIIE [Online]. Available at: http://ijariie.com/AdminUploadPdf/Timing_Enabled_Proxy_Re_Encryption_Function_for_E_Health_Clouds_with_Designated_Tester_Using_Conjunctive_Keyword_Search_ijariie5097.pdf (Accessed : 06 February 2020)
IEEE Aiman Hasan, and Dr. Rekha Patil, "Timing Enabled Proxy Re-Encryption Function for E-Health Clouds with Designated Tester Using Conjunctive Keyword Search," International Journal Of Advance Research And Innovative Ideas In Education, vol. 3, no. 3, pp. 477-481, May-Jun 2017. [Online]. Available: http://ijariie.com/AdminUploadPdf/Timing_Enabled_Proxy_Re_Encryption_Function_for_E_Health_Clouds_with_Designated_Tester_Using_Conjunctive_Keyword_Search_ijariie5097.pdf [Accessed : 06 February 2020].
Turabian Aiman Hasan, and Dr. Rekha Patil. "Timing Enabled Proxy Re-Encryption Function for E-Health Clouds with Designated Tester Using Conjunctive Keyword Search." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 3 number 3 (06 February 2020).
Vancouver Aiman Hasan, and Dr. Rekha Patil. Timing Enabled Proxy Re-Encryption Function for E-Health Clouds with Designated Tester Using Conjunctive Keyword Search. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2017 [Cited : 06 February 2020]; 3(3) : 477-481. Available from: http://ijariie.com/AdminUploadPdf/Timing_Enabled_Proxy_Re_Encryption_Function_for_E_Health_Clouds_with_Designated_Tester_Using_Conjunctive_Keyword_Search_ijariie5097.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads


Last download on 2/6/2020 11:38:24 PM

Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
DETECTION AND EXTRACTION OF SEA MINES USING CNNInformation Science and EngineeringSheethal S Download
Transformer architecture for image capturing using deep learning approachComputer EngineeringAJITH P J Download
SURFACE DEFECT DETECTION SYSTEM WITH MACHINE LEARNINGInformation Science EngineeringSIRITH N Download
Intelligent E-Business to Increase Online Sales Using Web MiningComputer Science and EngineeringSachin Balvir Download
A REAL TIME APPLICATION TO REDUCE TRAFFIC ACCIDENTSInformation Science and EngineeringAbhishek R Dalawai Download
TRANFORMERS BASED MULTI-LABEL IMAGE CLASSIFICATION AND NAMINGComputer EngineeringJERIN JACOB Download
Literature survey of Blockexchangecomputer science EngineeringSHAHANAS M S Download
QUANTITATIVE EVALUATION OF AN AUTOMATED CONE-BASED BREAST ULTRASOUND SCANNER FOR MRI 3D US IMAGE FUSIONComputer EngineeringLidhi P Download
Prevention of Wormhole Attack in WSN using Energy Optimized Scheme based on HopComputer EngineeringYogesh Hassani Download
DIFFERENT TECHNIQUES USED FOR CREDIT CARD FRAUD DETECTION – A LITERATURE SURVEYComputer EngineeringBushara Hamza Download
An Early Prediction and Detection of Alzheimer’s Disease - Literature surveyComputer EngineeringJenny Thomas Download
Energy Management SystemComputer Science and EngineeringSnehal P. Patil Download
Literature Survey:weather prediction and climate analysis using machine learningComputer EngineeringCHRISTINA MARY JOLLY Download
A Method For Predict Chronic Kidney Prediction-Literature SurveyComputer Science & EngineeringAnn Mariya George Download
A Review on Study & Analysis of WSN, Attacks & its ApplicationsComputer EngineeringYogesh Hassani Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2022. IJARIIE. All Rights Reserved.