<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 7 Issue 2</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Sciecne&amp; Engineering</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>March - April 2019</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2019</Year>
        <Month>12</Month>
        <Day>12</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>A Review on Multilevel Approaches for Security in Cloud by Using ABE</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>18</FirstPage>
      <LastPage>21</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Akhilesh Kumar Soni</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
                      <FirstName>Nitya Khare</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
           
        </Author>
      </AuthorList>
      <DOI>https://doi.org/10.21276/ijircst.2019.7.2.3</DOI>
      <Abstract>Public Key Encryption acts as the basic technique for ABE where it provides one to many encryptions, here, the private key of users &amp;amp; the ciphertext both rely on attributes such that, when the set of the attributes of users key matches set of attributes of cipher-text with its corresponding access policy, only then decryption is possible. Thus, an opponent could grant access to the sensitive information that holds multiple keys, if it has at least one individual key for accession. Medical organizations find it challenging to adopt cloud-based electronic medical records services, due to the risk of data breaches and the resulting compromise of patient data. Hence there is a need of developing a proper authorization delegation mechanism for safe, secure and easy cloud-based EHR management.In this research work a centralized, attribute based authorization mechanism is developed that uses Attribute Based Encryption (ABE) and allows for delegated secure access of patient records.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Cloud computing, Data sharing, Data confidentiality, Security, ABE, Access controls.</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=348</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>