Journal of Cybersecurity and Information Management JCIM 2690-6775 2769-7851 10.54216/JCIM https://www.americaspg.com/journals/show/696 2019 2019 Parasitic overview on different key management schemes for protection of Patients Health Records Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore 641114, India. Shibin Shibin Department of ECE, Karunya Institute of Technology and Sciences, Coimbatore 641114, India K. Martin Sagayam Faculty of Computers and Artificial Intelligence, Beni-Suef University, Beni Suef City, 62511, Egypt Ahmed A. Elngar The main goal of HIPAA (Health Insurance Portability and Accountability Act) is to protect health information of individuals against access without consent or authorization. Security and privacy are the main issues in HIPAA. A compliant key management solution is used to reduce harm and risk while providing cryptographic mechanisms. Using ECC (Elliptic Curve Cryptography) we ensure more security for access of patient’s health records. This provides same level of security for access of patient’s health records. Patient’s health Information is stored in RFID cards. Finally, the proposed method ensures higher level of security than other existing cryptographic techniques. ECC provides more security even with small key sizes. Proposed scheme describes the various counter measures for improving security and a key recovery mechanism for the protection of keys. 2021 2021 96 100 10.54216/JCIM.060202 https://www.americaspg.com/articleinfo/2/show/696