Skip to main content
Erschienen in: Wireless Personal Communications 2/2019

08.05.2019

ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment

verfasst von: V. Sri Vigna Hema, Ramesh Kesavan

Erschienen in: Wireless Personal Communications | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In today’s world, Cloud computing based health cloud is an effective platform for enhancing e-health productivity, i.e., healthcare professionals can provide medical service by accessing health information on any device in any location at any time. The major challenge faced by a healthcare organization is secure sharing of healthcare data in health cloud among general practitioner, medical services, and insurance firms. In order to overcome this issue, the security of sensitive healthcare data is accomplished with encryption mechanisms. In this research work, the medical data files are encrypted using elliptic curve cryptography algorithm to possess confidentiality and integrity in the healthcare data while sharing data via health cloud. The experimental results exhibits better performance in terms of key generation time, turn-around time, file encryption time, file decryption time, file upload time, file download time, file uploading speed, as well as security overhead. Furthermore, it also securely transmits the healthcare data over health cloud by defending against insider threats.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Miranda, J., Memon, M., Cabral, J., Ravelo, B., Wagner, S. R., Pedersen, C. F., et al. (2017). Eye on patient care: Continuous health monitoring: Design and implementation of a wireless platform for healthcare applications. IEEE Microwave Magazine, 18(2), 83–94.CrossRef Miranda, J., Memon, M., Cabral, J., Ravelo, B., Wagner, S. R., Pedersen, C. F., et al. (2017). Eye on patient care: Continuous health monitoring: Design and implementation of a wireless platform for healthcare applications. IEEE Microwave Magazine, 18(2), 83–94.CrossRef
2.
Zurück zum Zitat Abo-Zahhad, M., Ahmed, S. M., & Elnahas, O. (2014). A wireless emergency telemedicine system for patients monitoring and diagnosis. International Journal of Telemedicine and Applications, 2014, 4.CrossRef Abo-Zahhad, M., Ahmed, S. M., & Elnahas, O. (2014). A wireless emergency telemedicine system for patients monitoring and diagnosis. International Journal of Telemedicine and Applications, 2014, 4.CrossRef
3.
Zurück zum Zitat Jin, Z., & Chen, Y. (2015). Telemedicine in the cloud era: Prospects and challenges. IEEE Pervasive Computing, 14(1), 54–61.CrossRef Jin, Z., & Chen, Y. (2015). Telemedicine in the cloud era: Prospects and challenges. IEEE Pervasive Computing, 14(1), 54–61.CrossRef
4.
Zurück zum Zitat Hsieh, J.-C., & Hsu, M.-W. (2012). A cloud computing based 12-lead ECG telemedicine service. BMC Medical Informatics and Decision Making, 12(1), 77.MathSciNetCrossRef Hsieh, J.-C., & Hsu, M.-W. (2012). A cloud computing based 12-lead ECG telemedicine service. BMC Medical Informatics and Decision Making, 12(1), 77.MathSciNetCrossRef
5.
Zurück zum Zitat Wang, X. A., Ma, J., Xhafa, F., Zhang, M., & Luo, X. (2017). Cost-effective secure E-health cloud system using identity based cryptographic techniques. Future Generation Computer Systems, 67, 242–254.CrossRef Wang, X. A., Ma, J., Xhafa, F., Zhang, M., & Luo, X. (2017). Cost-effective secure E-health cloud system using identity based cryptographic techniques. Future Generation Computer Systems, 67, 242–254.CrossRef
6.
Zurück zum Zitat Ruiz-Zafra, Á., Benghazi, K., Noguera, M., & Garrido, J. L. (2013). Zappa: An open mobile platform to build cloud-based m-health systems. In Ambient intelligence-software and applications (pp. 87–94). Springer. Ruiz-Zafra, Á., Benghazi, K., Noguera, M., & Garrido, J. L. (2013). Zappa: An open mobile platform to build cloud-based m-health systems. In Ambient intelligence-software and applications (pp. 87–94). Springer.
7.
Zurück zum Zitat Bourouis, A., Feham, M., & Bouchachia, A. (2012). A new architecture of a ubiquitous health monitoring system: A prototype of cloud mobile health monitoring system. arXiv:1205.6910. Bourouis, A., Feham, M., & Bouchachia, A. (2012). A new architecture of a ubiquitous health monitoring system: A prototype of cloud mobile health monitoring system. arXiv:​1205.​6910.
8.
Zurück zum Zitat Li, Z.-R., Chang, E.-C., Huang, K.-H., & Lai, F. (2011). A secure electronic medical record sharing mechanism in the cloud computing platform. In 2011 IEEE 15th international symposium on consumer electronics (ISCE) (pp. 98–103). IEEE. Li, Z.-R., Chang, E.-C., Huang, K.-H., & Lai, F. (2011). A secure electronic medical record sharing mechanism in the cloud computing platform. In 2011 IEEE 15th international symposium on consumer electronics (ISCE) (pp. 98–103). IEEE.
9.
Zurück zum Zitat Wu, R., Ahn, G.-J., & Hu, H. (2012). Secure sharing of electronic health records in clouds. In 2012 8th International conference on collaborative computing: Networking, applications and worksharing (CollaborateCom) (pp. 711–718). IEEE. Wu, R., Ahn, G.-J., & Hu, H. (2012). Secure sharing of electronic health records in clouds. In 2012 8th International conference on collaborative computing: Networking, applications and worksharing (CollaborateCom) (pp. 711–718). IEEE.
10.
Zurück zum Zitat Liu, D.-l., Chen, Y.-p., & Huai-ping, Z. (2010). Secure applications of RSA system in the electronic commerce. In 2010 International conference on future information technology and management engineering (FITME) (Vol. 1, pp. 86–89). IEEE. Liu, D.-l., Chen, Y.-p., & Huai-ping, Z. (2010). Secure applications of RSA system in the electronic commerce. In 2010 International conference on future information technology and management engineering (FITME) (Vol. 1, pp. 86–89). IEEE.
11.
Zurück zum Zitat Gola, K. K., Gupta, B., & Iqbal, Z. (2014). Modified RSA digital signature scheme for data confidentiality. International Journal of Computer Applications, 106(13), 13–16. Gola, K. K., Gupta, B., & Iqbal, Z. (2014). Modified RSA digital signature scheme for data confidentiality. International Journal of Computer Applications, 106(13), 13–16.
12.
Zurück zum Zitat Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications, 3(4), 1922–1926. Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications, 3(4), 1922–1926.
13.
Zurück zum Zitat Rahumed, A., Chen, H. C., Tang, Y., Lee, P. P., & Lui, J. C. (2011). A secure cloud backup system with assured deletion and version control. In 2011 40th International conference on parallel processing workshops (ICPPW) (pp. 160–167). IEEE. Rahumed, A., Chen, H. C., Tang, Y., Lee, P. P., & Lui, J. C. (2011). A secure cloud backup system with assured deletion and version control. In 2011 40th International conference on parallel processing workshops (ICPPW) (pp. 160–167). IEEE.
14.
Zurück zum Zitat Xu, L., Wu, X., & Zhang, X. (2012). CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proceedings of the 7th ACM symposium on information, computer and communications security, 2012 (pp 87–88). ACM. Xu, L., Wu, X., & Zhang, X. (2012). CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proceedings of the 7th ACM symposium on information, computer and communications security, 2012 (pp 87–88). ACM.
15.
Zurück zum Zitat Seo, S.-H., Nabeel, M., Ding, X., & Bertino, E. (2014). An efficient certificateless encryption for secure data sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 26(9), 2107–2119.CrossRef Seo, S.-H., Nabeel, M., Ding, X., & Bertino, E. (2014). An efficient certificateless encryption for secure data sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 26(9), 2107–2119.CrossRef
16.
Zurück zum Zitat Itani, W., Kayssi, A., & Chehab, A. (2010). Energy-efficient incremental integrity for securing storage in mobile cloud computing. In 2010 International conference on energy aware computing (ICEAC) (pp. 1–2). IEEE. Itani, W., Kayssi, A., & Chehab, A. (2010). Energy-efficient incremental integrity for securing storage in mobile cloud computing. In 2010 International conference on energy aware computing (ICEAC) (pp. 1–2). IEEE.
17.
Zurück zum Zitat Khan, A. N., Kiah, M. M., Madani, S. A., Ali, M., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624–651.CrossRef Khan, A. N., Kiah, M. M., Madani, S. A., Ali, M., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624–651.CrossRef
18.
Zurück zum Zitat Chen, Y.-R., & Tzeng, W.-G. (2012). Efficient and provably-secure group key management scheme using key derivation. In 2012 IEEE 11th International conference on trust, security and privacy in computing and communications (TrustCom) (pp. 295–302). IEEE. Chen, Y.-R., & Tzeng, W.-G. (2012). Efficient and provably-secure group key management scheme using key derivation. In 2012 IEEE 11th International conference on trust, security and privacy in computing and communications (TrustCom) (pp. 295–302). IEEE.
19.
Zurück zum Zitat Chen, Y.-R., Tygar, J., & Tzeng, W.-G. (2011). Secure group key management using uni-directional proxy re-encryption schemes. In INFOCOM, 2011 proceedings IEEE (pp. 1952–1960). IEEE. Chen, Y.-R., Tygar, J., & Tzeng, W.-G. (2011). Secure group key management using uni-directional proxy re-encryption schemes. In INFOCOM, 2011 proceedings IEEE (pp. 1952–1960). IEEE.
20.
Zurück zum Zitat Ali, M., Dhamotharan, R., Khan, E., Khan, S. U., Vasilakos, A. V., Li, K., et al. (2017). SeDaSC: Secure data sharing in clouds. IEEE Systems Journal, 11(2), 395–404.CrossRef Ali, M., Dhamotharan, R., Khan, E., Khan, S. U., Vasilakos, A. V., Li, K., et al. (2017). SeDaSC: Secure data sharing in clouds. IEEE Systems Journal, 11(2), 395–404.CrossRef
21.
Zurück zum Zitat Zhang, L., Wu, Q., Mu, Y., & Zhang, J. (2016). Privacy-preserving and secure sharing of PHR in the cloud. Journal of Medical Systems, 40(12), 267.CrossRef Zhang, L., Wu, Q., Mu, Y., & Zhang, J. (2016). Privacy-preserving and secure sharing of PHR in the cloud. Journal of Medical Systems, 40(12), 267.CrossRef
22.
Zurück zum Zitat Rao, Y. S. (2017). A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Generation Computer Systems, 67, 133–151.CrossRef Rao, Y. S. (2017). A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Generation Computer Systems, 67, 133–151.CrossRef
Metadaten
Titel
ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
verfasst von
V. Sri Vigna Hema
Ramesh Kesavan
Publikationsdatum
08.05.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06450-7

Weitere Artikel der Ausgabe 2/2019

Wireless Personal Communications 2/2019 Zur Ausgabe

Neuer Inhalt