Show simple item record

dc.contributor.authorKanika Sharma
dc.contributor.authorAlka Agrawal
dc.contributor.authorDhirendra Pandey
dc.contributor.authorR.A. Khan
dc.contributor.authorShail Kumar Dinkar
dc.contributor.otherDepartment of IT, Babasaheb Bhimrao Ambedkar University, Lucknow, India
dc.contributor.otherDepartment of IT, Babasaheb Bhimrao Ambedkar University, Lucknow, India
dc.contributor.otherDepartment of IT, Babasaheb Bhimrao Ambedkar University, Lucknow, India
dc.contributor.otherDepartment of IT, Babasaheb Bhimrao Ambedkar University, Lucknow, India
dc.contributor.otherG.B. Pant Institute of Engineering and Technology, Pauri Garhwal, Uttarakhand, India
dc.date.accessioned2025-10-09T05:16:51Z
dc.date.available2025-10-09T05:16:51Z
dc.date.issued01-05-2022
dc.identifier.urihttp://www.sciencedirect.com/science/article/pii/S1319157819305592
dc.identifier.urihttp://digilib.fisipol.ugm.ac.id/repo/handle/15717717/40910
dc.description.abstractSensitive Health Information (SHI) is a developing patient-centric model of medical data exchange, which is frequently outsourced to be stored at third party servers. Though, there have been various privacy issues as SHI could be disclosed to the unauthorised and third parties. This is a promising method to encrypt the SHI before outsourcing to assure the patients’ control over access to their own SHI. However, challenges like scalability in key management and flexible access have remained the most significant issues toward achieving fine-grained, cryptographically data access control. In this paper, the authors proposed a novel patient-centric system model for access control to SHIs stored in semi-honest servers. For fine-grained and scalable access control for SHIs, authors have proposed an encryption technique which is an improvement over RSA techniques to encrypt every patient’s SHI file. To different from previous works in secure data transmission, the authors focus on the data owner and divide users into several domains in SHI, which greatly decrease the key management complexity for data owners and users. Comprehensive analytical and experimental results are presented which reflect the efficiency of the proposed approach.
dc.language.isoEN
dc.publisherElsevier
dc.subject.lccElectronic computers. Computer science
dc.titleRSA based encryption approach for preserving confidentiality of big data
dc.typeArticle
dc.description.keywordsBig data
dc.description.keywordsSensitive health information
dc.description.keywordsSecurity
dc.description.keywordsKey generation
dc.description.keywordsRSA encryption
dc.description.pages2088-2097
dc.description.doi10.1016/j.jksuci.2019.10.006
dc.title.journalJournal of King Saud University: Computer and Information Sciences
dc.identifier.oaioai:doaj.org/journal:1db8590b7c89450fa4666eb16cfb7651
dc.journal.infoVolume 34, Issue 5


This item appears in the following Collection(s)

Show simple item record