0% found this document useful (0 votes)
26 views1 page

Action Recognition Using CNN and LSTM For Video Classification

The document proposes a system for multi-authority access control with anonymous authentication for personal health records. The system aims to preserve patient privacy while enabling access to medical records online through the use of attribute-based encryption. The proposed system architecture allows data owners to securely store encrypted health records in the cloud and grant access to authorized users like doctors through a secret key-based registration and login process.

Uploaded by

Prajwal G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views1 page

Action Recognition Using CNN and LSTM For Video Classification

The document proposes a system for multi-authority access control with anonymous authentication for personal health records. The system aims to preserve patient privacy while enabling access to medical records online through the use of attribute-based encryption. The proposed system architecture allows data owners to securely store encrypted health records in the cloud and grant access to authorized users like doctors through a secret key-based registration and login process.

Uploaded by

Prajwal G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

MULTI-AUTHORITY ACCESS CONTROL WITH ANONYMOUS

AUTHENTICATION FOR PERSONAL HEALTH RECORD


SUBMITTED BY UNDER THE GUIDENCE OF
SACHIN RV Ms. SOWMYA K
1NT21MC084 Assistant Professor
Department of MCA Department of MCA

INTRODUCTION SYSTEM ARCHITECTURE FLOW DIAGRAM

PHR (Personal Health Record) has emerged as a crucial


technology for data exchange in recent years. It enables the
storage of medical records online, allowing patients and
doctors to access them from any location at any time.
However, the adoption of PHR also introduces concerns
regarding privacy loss during data exchange. To address
these challenges and preserve patient privacy while
enhancing control over PHR, attribute-based encryption
(ABE) has gained significant attention as a fine-grained
access control mechanism.

OBJECTIVES
1. Our project's primary goal is to build a secret key-
based registration and login process for data owners.
2. To implement appointment fixing, and the program FUTURE ENHANCEMENT REFERENCES
was secured with a secret key utilizing attribute-
1. As a future work, it would be interesting to 1. L. Tbraimi, M. Asim, M. Petkovi, “Secure management of
based encryption. And with the consent of the Cloud personal health records by applying attribute-based
modify or advanced algorithm are used to
server Authority, the encrypted file is stored in the encryption, In Proceeding of the International Workshop on
encryption process and store more securely in
cloud cloud
Wearable Micro and Nano Technologies for Personalized
3. To implement user, view the appointments that the Health(pHealth),” in Oslo, Norway, Jun.2009, pp.71– 74.
2. ·Future extension of this article includes
2. J. Akinyele, M. Pagano, M. D. Green, “Securing electronic
central authority has offered for acceptance. And extending the proposed model to more and medical records using attribute-based encryption on mobile
with CSP permission, they will receive data from the more efficient process to implement in online as devices,” in Proceeding of the ACM Workshop on Security
Cloud following acceptance. After then, they will use such as a real-time process also. and Privacy in Smartphones and Mobile Devices, Oct.2011,
a secret key to decode the data pp.75–86.

You might also like