Now a day every information is stored and shared on the cloud. And so the medical record especially
Personal Health Record (PHR) is an important part of health information exchange, that is need to be
stored at cloud servers. But there are various privacy problems as personal health information could be
discovered to unauthorized people. That need guarantee of the patient control over to their own PHRs,
in this method encryption of the PHRs is done before the storage on cloud. But still issues like risks
of privacy, efficiency in key administration, flexible access and efficient user administration, have still
remained the important challenge toward achieving better, cryptography imposed data access control.
In this research development, we develop a mechanism for control of data access to PHRs stored in
cloud servers. To achieve this efficient and modular data access control for PHRs, we provide encryption
approach for the encryption to each PHR file. For this system method already tried to focus on the
multiple data ownership scheme also dividing the users into security domains that highly reduce the
key management complication for owners and users. Here the system takes patient privacy as serious
issue and guaranteed it by exploiting multi-authority Encryption. Our main aim is not only privacy
but also systems scheme try to enable modification of access policies or file attributes, and break-glass
access under emergency situations. Our proposed scheme shows Extensive analysis and experimental
results are presented for security and efficiency of PHR.
By adapting a previously written percolation model in C, the threshold probabilities for square, triangular, and cubic lattice types were confirmed. An algorithm to count the distribution of cluster sizes at a variety of percolation probabilities was developed, and the expected trends towards the so called infinite cluster was achieved. An equivalent bond percolation model was adapted to the original site algorithm, and by treating occupied bonds as springs, a total compression trend for the model was constructed, which implied that structures under the boundary conditions that were imposed does not have behavior that changes the total compression constant significantly at the percolation threshold.\\
This is the trials of creating a simple Pong game in six days time. there were severak errors along the way, and the game itself was never actually completed, but it was a fantastic learning experience that will prepare me for future programming courses.