A Mobile Health Care Social Networks In Cloud Computing Based On Secure Identity Based Data Sharing and Profile Matching

Authors

  • A Apoorva Dept. of Computer Science, East West Institute of technology, Vishveswaraya Technological University, Bangalore, India
  • Amoolya K Dept. of Computer Science, East West Institute of technology, Vishveswaraya Technological University, Bangalore, India
  • Anil K Dept. of Computer Science, East West Institute of technology, Vishveswaraya Technological University, Bangalore, India
  • M. Guruprasad Dept. of Computer Science, East West Institute of technology, Vishveswaraya Technological University, Bangalore, India
  • Vinodh HN Dept. of Computer Science, East West Institute of technology, Vishveswaraya Technological University, Bangalore, India

Keywords:

conditional proxy re-encryption, data security, encryption, health information management, profile matching

Abstract

Cloud computing and social networks are providing real time data sharing by changing the way of healthcare in a cost-effective manner. However, data security issue is one of the main obstacles of mobile healthcare social networks (MHSN), since health information is considered to be highly sensitive and securable. In this paper, we introduce a mobile health care social networks in cloud computing based on profile matching and data sharing. The patients can outsource their encrypted health records to cloud storage with identity-based broadcast encryption (IBBE) technique, and share them with a group of doctors in a secure and efficient manner with domains and sub domains

References

[1] M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE Trans on Parallel and Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.

[2] M. Barua X. Liang, R. Lu and X. Shen, “ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing,” International Journal of Security and Networks, vol. 6, no. 2/3, pp. 67-76, Nov. 2011

[3] S. Yu, C. Wang, K. Ren and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. 29th Conference on Information Communications, San Diego, CA, USA, 2010, pp. 534-542

[4] Y. Liu, Y. Zhang, J. Ling and Z. Liu, “Secure and fine-grained access control on e-healthcare records in mobile cloud computing,” Future Generat.Comput. Syst., vol. 78, pp. 1020-1026, Jan. 2017.

[5] Y. Yang, X. Liu, R. Deng and Y. Li, “Lightweight sharable and traceable secure mobile health system,” IEEE Trans. Depend. Sec Comput., Jul. 2017. [Online]. Available: https://doi.org/10.1109/TDSC.2017.2729556

[6] Y. Yang, X. Liu and R. Deng, “Lightweight break-glass access control system for healthcare internet-of-things,” IEEE Transactions on Industrial Informatics, Sept. 2017.[Online]. Available: https://doi.org/10. 1109/TII.2017.2751640

[7] M. Blaze, G. Bleumer and M. Strauss, “Divertible protocols and atomic proxy cryptography,” in Proc. Advances in Cryptology - EUROCRYPT` 98, Espoo, Finland, 1998, pp. 127-144.

[8] M. Green, G. Ateniese, “Identity-based proxy re-encryption,” in Proc. the 5th International Conference on Applied Cryptography and Network Security, Zhuhai, China, 2007, pp. 288-306.

[9] T. Matsuo, “Proxy re-encryption systems for identity-based encryption,” in Proc. 1st International Conference on Pairing-Based Cryptography, Tokyo, Japan, 2007, pp. 247-267.

[10] Y. Zhou, H. Deng, Q. Wu, B. Qin, J. Liu and Y. Ding, “Identity-based proxy re-encryption version 2: Making mobile access easy in cloud,” Future Generat. Comput. Syst., vol. 62, pp. 128-139, Sept. 2016.

[11] X. Wang, J. Ma, F. Xhafa, M. Zhang and X. Luo, “Cost-effective secure E-health cloud system using identity based cryptographic techniques,” Future Generat.Comput. Syst., vol. 67, pp. 242-254, Feb. 2017.

[12]J. Weng, R. Deng, X. Ding, C. Chu and J. Lai, “Conditional proxy re-encryption secure against chosen-ciphertext attack,” in Proc. 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 2009, pp. 322-332.

[13] P. Xu, T. Jiao, Q. Wu, W. Wang and H. Jin, “Conditional identity-based broadcast proxy re-encryption and its application to cloud email,” IEEE Transactions on Computers, vol. 65, no. 1, pp. 66-79, Jan. 2016.

[14] R. Zhang, J. Zhang, Y Zhang, J. Sun and G. Yan, “Privacy-preserving profile matching for proximity-based mobile social networking,” IEEE J. Sel. Areas Comm., vol. 31, no. 9, pp. 656-668, Sept. 2013.

[15]L. Zhang, X. Li, K. Liu, T. Jung and Y. Liu, “Message in a sealed bottle: Privacy preserving friending in mobile social networks,” IEEE Trans. Mob. Comput., vol. 14, no. 9, pp. 1888-1902, Sept. 2015.

Downloads

Published

2025-11-26

How to Cite

[1]
A. Apoorva, K. Amoolya, K. Anil, M. Guruprasad, and V. HN, “A Mobile Health Care Social Networks In Cloud Computing Based On Secure Identity Based Data Sharing and Profile Matching”, Int. J. Comp. Sci. Eng., vol. 7, no. 15, pp. 54–58, Nov. 2025.