Research Article

Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health

Algorithm 1

Role-based proxy decryption level-II.
Input: Request to access a user
Output: Key and encrypted file
Procedure:
Step 1: let X be the request from the physician group users or the third-party group users and s is set as the patient id.
Step 2: if (requestor ← authenticated)
Step 3: then encrypted file is forwarded to the group user based on the role specific model
Step 4: based on the group user model, the public key for decryption is generated and forwarded to the Physician group user as
Step 5: .
Step 6: also, for the Third-party user, generate the public key for decryption and forward to the third party user as
Step 7: finally decrypt the data using,
Where is the private key of the user either the physician group user or the third party user.