skip to main content
10.1145/1866835.1866845acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Privacy preserving EHR system using attribute-based infrastructure

Published:08 October 2010Publication History

ABSTRACT

Secure management of Electronic Health Records (EHR) in a distributed computing environment such as cloud computing where computing resources including storage is provided by a third party service provider is a challenging task. In this paper, we explore techniques which guarantees security and privacy of medical data stored in the cloud. We show how new primitives in attribute-based cryptography can be used to construct a secure and privacy-preserving EHR system that enables patients to share their data among healthcare providers in a flexible, dynamic and scalable manner.

References

  1. }}Health insurance portability and accountability act of 1996. U.S. Government Printing Office, 1996.Google ScholarGoogle Scholar
  2. }}Recommendations for the interpretation and application of the personal information protection and electronic documents act (s.c.2000, c.5) in the health research context. Technical report, Canadian Institutes of Health Research, November 2001.Google ScholarGoogle Scholar
  3. }}N. Attrapadung and H. Imai. Conjunctive broadcast and attribute-based encryption. In Pairing '09: The 3rd International Conference on Pairing-Based Cryptography, volume 5671 of Lecture Notes in Computer Science, pages 248--265. Springer-Verlag, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. }}J. Benaloh, M. Chase, E. Horvitz, and K. Lauter. Patient controlled encryption: Ensuring privacy in medical health records. In ACM CCSW 2009, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. }}J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, 2007, SP '07, pages 321--334. IEEE Xplore, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}L. Fang, W. Susilo, C. Ge, and J. Wang. A secure channel free public key encryption with keyword search scheme without random oracle. In CANS '09: Proceedings of the 8th International Conference on Cryptology and Network Security, pages 248--258. Springer-Verlag, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}J. Hu, H. Chen, and T. Hou. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Computer Standards and Interfaces, 32(5-6):274--280, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. }}Google Inc. Google health. https://www.google.com/health/, 2009.Google ScholarGoogle Scholar
  9. }}S. Kamara and K. Lauter. Cryptographic cloud storage. In Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization - 2010, volume 6052 of Lecture Notes in Computer Science. Springer-Verlag, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. }}W. B. lee and C. D. Lee. A cryptographic key management solution for HIPAA privacy/security regulations. IEEE Transactions on Information Technology in Biomedicine, 12:34--41, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. }}A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In Advances in Cryptology-EUROCRYPT 2010, volume 6110 of Lecture Notes in Computer Science, pages 62--91. Springer-Verlag, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. }}K. Mandl, W. Simons, W. Crawford, and J. Abbett. Indivo: a personally controlled health record for health information exchange and communication. BMC Medical Informatics and Decision Making, 7(1):25, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  13. }}Microsoft. Microsoft healthvault. http://www.healthvault.com/personal/websites-overview.html, 2009.Google ScholarGoogle Scholar
  14. }}A. Sahai and B. Waters. Fuzzy identity-based encryption. In Advances in Cryptology-EUROCRYPT 2005, volume 3494 of Lecture Notes in Computer Science, pages 457--473. Springer Berlin/Heidelberg, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. }}P. Szolovits, J. Doyle, W. J. Long, I. Kohane, and S. G. Pauker. Guardian angel: Patient-centered health information systems. Technical report, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. }}W. D. Yu and M. A. Chekhanovskiy. An electronic health record content protection system using smartcard and PMR. In 9th International Conference on e-Health Networking, Application and Services, 2007, pages 11--18. IEEE Xplore, 2007.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Privacy preserving EHR system using attribute-based infrastructure

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCSW '10: Proceedings of the 2010 ACM workshop on Cloud computing security workshop
      October 2010
      118 pages
      ISBN:9781450300896
      DOI:10.1145/1866835

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 October 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate37of108submissions,34%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader