Research Article
Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health
Algorithm 1
Role-based proxy decryption level-II.
| Input: Request to access a user | | Output: Key and encrypted file | | Procedure: | | Step 1: let X be the request from the physician group users or the third-party group users and s is set as the patient id. | | Step 2: if (requestor ← authenticated) | | Step 3: then encrypted file is forwarded to the group user based on the role specific model | | Step 4: based on the group user model, the public key for decryption is generated and forwarded to the Physician group user as | | Step 5: . | | Step 6: also, for the Third-party user, generate the public key for decryption and forward to the third party user as | | Step 7: finally decrypt the data using, | | Where is the private key of the user either the physician group user or the third party user. |
|