An Efficient Approach for Secured E-Health Cloud System Using Identity Based Cryptography Techniques in Cloud Computing Environment


Shikha Mittal,Paramjeet Singh,Rahul Malhotra,



Cloud computing,EHR,Data Privacy,Key Management,


Nowadays, cloud computing is an interesting research area among the researchers. It is an internet-based pool of heterogeneous resources. Cloud environment is very much reliable to make availability of resources when required to online users. Reliable computing services can be handled without any own infrastructures, so it would be considered as an alternate cost effective technique. Most of the organizations utilized the technique of cloud computing to host their applications. The service of the health care unit is the most essential service for the people. There is a necessity to store the sensitive information related to the patient’s medical history in a secure way. Therefore, the research and development in the Personal Health records and Electronic Health records is negligible area. Thus the most robust encryption and decryption should be encountered. One among the advanced technology in cloud computing is the maintenance of Electronic Health Records (EHR). The main objective of this paper is to propose and implement a methodology to exchange the health information about a particular person in a secured cloud environment. The medical information about a patient from distributed manner is also maintained in EHR by cloud environment. The stored information of the user provides the facility of collecting, sharing, exchanging and organizing that information through users. Therefore, an efficient approach for securing e-health cloud system using identity based cryptography techniques is presented in this research study.


I.Aljawarneh SA & Yassein MOB (2016), ‘A Conceptual Security Framework for Cloud Computing Issues’, International Journal of Intelligent Information Technologies (IJIIT), Vol. 12,No. 2, pp. 12-24.

II.Almorsy M, Grundy J & Müller I (2016), ‘An Analysisof the Cloud Computing Security Problem’, arXiv preprint arXiv:1609.01107.

III.Dhirender Singh, R.K. Banyal, Arvind Sharma, ‘Cloud Computing Research Issues, Challenges, and Future Directions’, Emerging Trends in Expert Applications and Security, Advances in Intelligent Systems and Computing 841, Springer Nature Singapore Pte Ltd. 2018

IV.Fabian B, Ermakova T & Junghanns P (2015), ‘Collaborativeand Secure Sharing of Healthcare Data in Multi-Clouds’, Information Systems, Vol. 48, pp. 132-150.

V.Hu Y & Bai G (2014), ‘A Systematic Literature Review of Cloud Computing in e-Health’, arXiv preprint arXiv:1412.2494.

VI.Huang Q, Yue W, He Y & Yang Y(2018), ‘Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing’, IEEE Access, Vol. 6, pp. 36584-36594.

VII.Kalaiprasath R, Elankavi R & Udayakumar DR. (2017), ‘Cloud. Security and Compliance-A Semantic Approach in End to End Security’, International Journal of Mechanical Engineering and Technology (IJMET), Vol. 8,No.5.

VIII.Khan SS & Tuteja R (2015), ‘Security in Cloud Computing using Cryptographic Algorithms’, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3,No. 1, pp. 148-155.

IX.Li J, Zhang Y, Chen X & Xiang Y(2018), ‘Secure Attribute-Based Data Sharing for Resource-Limited Users in Cloud Computing’, Computers & Security, Vol. 72, pp. 1-12.

X.Liang K, Liu JK, Wong DS & Susilo W (2014), ‘An efficient Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme for Public Clouds Data Sharing’, European Symposium on Research in Computer Security, pp. 257-272.

XI.Luna J, Taha A, Trapero R &Suri N. (2017), ‘Quantitative Reasoning about Cloud Security Using Service Level Agreements’, IEEE Transactions on Cloud Computing, Vol. 5,No. 3, pp. 457-471.

XII.Ma (2016), ‘Identity-based Encryption with Outsourced Equality Test in Cloud Computing’, Information Sciences, Vol. 328, pp. 389-402.

XIII.Samarati P, Di Vimercati SDC, Murugesan S & Bojanova I (2016), ‘Cloud Security: Issues and Concerns’, Encyclopedia on Cloud Computing, pp. 207-219.

XIV.Shen Q, Liang X, Shen XS, Lin X & Luo HY (2014), ‘Exploiting Geo-Distributed Clouds foraE-Health Monitoring System with Minimum Service Delay and Privacy Preservation’, IEEE Journal of Biomedical and Health Informatics, Vol. 18,No. 2, pp. 430-439.

XV.Xhafa F, Li J, Zhao G, Li J, Chen X & Wong DS (2015), ‘Designing Cloud-Based Electronic Health Record System with Attribute-Based Encryption’, Multimedia Tools and Applications, Vol. 74, No. 10, pp. 3441-3458

Shikha Mittal, Paramjeet Singh, Rahul Malhotra View Download