Return to Article Details Encryption Schemes for Securing Cloud-based PHR Systems Download Download PDF