Password Authentication Scheme Based On Shape and Text for Secure Sharing Of PHR Using ABE in Cloud
Kavitha Murugesan1, Anjana.T.K2
1Kavitha Murugesan, Department of Computer Science, University of Calicut, Vedavyasa Institute of Technology, Malappuram, India
2Anjana.T.K,Department of Computer science , University of Calicut Vedavyasa Institute of Technology, Malappuram, India.
Manuscript received on April 04, 2013. | Revised Manuscript received on April 27, 2013. | Manuscript published on May 05, 2013. | PP: 384-389 | Volume-3, Issue-2, May 2013. | Retrieval Number: B1574053213/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Information Technology is widely used in health care for efficiently managing the Personal Health Records (PHR) in a cost effective manner. Under this scenario a computing paradigm (cloud computing) where the resources are provided as services will offer a ubiquitous access to medical data. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. In our paper a hybrid password authentication scheme based on shape and text is used. It uses shapes of strokes on the grid as the origin passwords and allows users to login with text passwords with the help of traditional input devices. Hidden-camera and shoulder-surfing is highly resistible with this approach. The scheme also has high scalability and flexibility to enhance the authentication process security. Such a privacy preserving PHR system should be enforced cryptographically too. We also leverage attribute based encryption (ABE) techniques to encrypt each patient’s PHR. Apart from previous works in secure outsourcing of data, multiple data owner scenario is focused, and users in the PHR system is divided into multiple security domains that greatly reduces the key management complexity for owners and users.
Keywords: Attribute Based Encryption, Cloud Computing, Hybrid Password Authentication, Personal Health Records.