Skip to main content
Top
Published in: Wireless Personal Communications 2/2019

08-05-2019

ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment

Authors: V. Sri Vigna Hema, Ramesh Kesavan

Published in: Wireless Personal Communications | Issue 2/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In today’s world, Cloud computing based health cloud is an effective platform for enhancing e-health productivity, i.e., healthcare professionals can provide medical service by accessing health information on any device in any location at any time. The major challenge faced by a healthcare organization is secure sharing of healthcare data in health cloud among general practitioner, medical services, and insurance firms. In order to overcome this issue, the security of sensitive healthcare data is accomplished with encryption mechanisms. In this research work, the medical data files are encrypted using elliptic curve cryptography algorithm to possess confidentiality and integrity in the healthcare data while sharing data via health cloud. The experimental results exhibits better performance in terms of key generation time, turn-around time, file encryption time, file decryption time, file upload time, file download time, file uploading speed, as well as security overhead. Furthermore, it also securely transmits the healthcare data over health cloud by defending against insider threats.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Miranda, J., Memon, M., Cabral, J., Ravelo, B., Wagner, S. R., Pedersen, C. F., et al. (2017). Eye on patient care: Continuous health monitoring: Design and implementation of a wireless platform for healthcare applications. IEEE Microwave Magazine, 18(2), 83–94.CrossRef Miranda, J., Memon, M., Cabral, J., Ravelo, B., Wagner, S. R., Pedersen, C. F., et al. (2017). Eye on patient care: Continuous health monitoring: Design and implementation of a wireless platform for healthcare applications. IEEE Microwave Magazine, 18(2), 83–94.CrossRef
2.
go back to reference Abo-Zahhad, M., Ahmed, S. M., & Elnahas, O. (2014). A wireless emergency telemedicine system for patients monitoring and diagnosis. International Journal of Telemedicine and Applications, 2014, 4.CrossRef Abo-Zahhad, M., Ahmed, S. M., & Elnahas, O. (2014). A wireless emergency telemedicine system for patients monitoring and diagnosis. International Journal of Telemedicine and Applications, 2014, 4.CrossRef
3.
go back to reference Jin, Z., & Chen, Y. (2015). Telemedicine in the cloud era: Prospects and challenges. IEEE Pervasive Computing, 14(1), 54–61.CrossRef Jin, Z., & Chen, Y. (2015). Telemedicine in the cloud era: Prospects and challenges. IEEE Pervasive Computing, 14(1), 54–61.CrossRef
4.
go back to reference Hsieh, J.-C., & Hsu, M.-W. (2012). A cloud computing based 12-lead ECG telemedicine service. BMC Medical Informatics and Decision Making, 12(1), 77.MathSciNetCrossRef Hsieh, J.-C., & Hsu, M.-W. (2012). A cloud computing based 12-lead ECG telemedicine service. BMC Medical Informatics and Decision Making, 12(1), 77.MathSciNetCrossRef
5.
go back to reference Wang, X. A., Ma, J., Xhafa, F., Zhang, M., & Luo, X. (2017). Cost-effective secure E-health cloud system using identity based cryptographic techniques. Future Generation Computer Systems, 67, 242–254.CrossRef Wang, X. A., Ma, J., Xhafa, F., Zhang, M., & Luo, X. (2017). Cost-effective secure E-health cloud system using identity based cryptographic techniques. Future Generation Computer Systems, 67, 242–254.CrossRef
6.
go back to reference Ruiz-Zafra, Á., Benghazi, K., Noguera, M., & Garrido, J. L. (2013). Zappa: An open mobile platform to build cloud-based m-health systems. In Ambient intelligence-software and applications (pp. 87–94). Springer. Ruiz-Zafra, Á., Benghazi, K., Noguera, M., & Garrido, J. L. (2013). Zappa: An open mobile platform to build cloud-based m-health systems. In Ambient intelligence-software and applications (pp. 87–94). Springer.
7.
go back to reference Bourouis, A., Feham, M., & Bouchachia, A. (2012). A new architecture of a ubiquitous health monitoring system: A prototype of cloud mobile health monitoring system. arXiv:1205.6910. Bourouis, A., Feham, M., & Bouchachia, A. (2012). A new architecture of a ubiquitous health monitoring system: A prototype of cloud mobile health monitoring system. arXiv:​1205.​6910.
8.
go back to reference Li, Z.-R., Chang, E.-C., Huang, K.-H., & Lai, F. (2011). A secure electronic medical record sharing mechanism in the cloud computing platform. In 2011 IEEE 15th international symposium on consumer electronics (ISCE) (pp. 98–103). IEEE. Li, Z.-R., Chang, E.-C., Huang, K.-H., & Lai, F. (2011). A secure electronic medical record sharing mechanism in the cloud computing platform. In 2011 IEEE 15th international symposium on consumer electronics (ISCE) (pp. 98–103). IEEE.
9.
go back to reference Wu, R., Ahn, G.-J., & Hu, H. (2012). Secure sharing of electronic health records in clouds. In 2012 8th International conference on collaborative computing: Networking, applications and worksharing (CollaborateCom) (pp. 711–718). IEEE. Wu, R., Ahn, G.-J., & Hu, H. (2012). Secure sharing of electronic health records in clouds. In 2012 8th International conference on collaborative computing: Networking, applications and worksharing (CollaborateCom) (pp. 711–718). IEEE.
10.
go back to reference Liu, D.-l., Chen, Y.-p., & Huai-ping, Z. (2010). Secure applications of RSA system in the electronic commerce. In 2010 International conference on future information technology and management engineering (FITME) (Vol. 1, pp. 86–89). IEEE. Liu, D.-l., Chen, Y.-p., & Huai-ping, Z. (2010). Secure applications of RSA system in the electronic commerce. In 2010 International conference on future information technology and management engineering (FITME) (Vol. 1, pp. 86–89). IEEE.
11.
go back to reference Gola, K. K., Gupta, B., & Iqbal, Z. (2014). Modified RSA digital signature scheme for data confidentiality. International Journal of Computer Applications, 106(13), 13–16. Gola, K. K., Gupta, B., & Iqbal, Z. (2014). Modified RSA digital signature scheme for data confidentiality. International Journal of Computer Applications, 106(13), 13–16.
12.
go back to reference Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications, 3(4), 1922–1926. Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications, 3(4), 1922–1926.
13.
go back to reference Rahumed, A., Chen, H. C., Tang, Y., Lee, P. P., & Lui, J. C. (2011). A secure cloud backup system with assured deletion and version control. In 2011 40th International conference on parallel processing workshops (ICPPW) (pp. 160–167). IEEE. Rahumed, A., Chen, H. C., Tang, Y., Lee, P. P., & Lui, J. C. (2011). A secure cloud backup system with assured deletion and version control. In 2011 40th International conference on parallel processing workshops (ICPPW) (pp. 160–167). IEEE.
14.
go back to reference Xu, L., Wu, X., & Zhang, X. (2012). CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proceedings of the 7th ACM symposium on information, computer and communications security, 2012 (pp 87–88). ACM. Xu, L., Wu, X., & Zhang, X. (2012). CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proceedings of the 7th ACM symposium on information, computer and communications security, 2012 (pp 87–88). ACM.
15.
go back to reference Seo, S.-H., Nabeel, M., Ding, X., & Bertino, E. (2014). An efficient certificateless encryption for secure data sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 26(9), 2107–2119.CrossRef Seo, S.-H., Nabeel, M., Ding, X., & Bertino, E. (2014). An efficient certificateless encryption for secure data sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 26(9), 2107–2119.CrossRef
16.
go back to reference Itani, W., Kayssi, A., & Chehab, A. (2010). Energy-efficient incremental integrity for securing storage in mobile cloud computing. In 2010 International conference on energy aware computing (ICEAC) (pp. 1–2). IEEE. Itani, W., Kayssi, A., & Chehab, A. (2010). Energy-efficient incremental integrity for securing storage in mobile cloud computing. In 2010 International conference on energy aware computing (ICEAC) (pp. 1–2). IEEE.
17.
go back to reference Khan, A. N., Kiah, M. M., Madani, S. A., Ali, M., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624–651.CrossRef Khan, A. N., Kiah, M. M., Madani, S. A., Ali, M., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624–651.CrossRef
18.
go back to reference Chen, Y.-R., & Tzeng, W.-G. (2012). Efficient and provably-secure group key management scheme using key derivation. In 2012 IEEE 11th International conference on trust, security and privacy in computing and communications (TrustCom) (pp. 295–302). IEEE. Chen, Y.-R., & Tzeng, W.-G. (2012). Efficient and provably-secure group key management scheme using key derivation. In 2012 IEEE 11th International conference on trust, security and privacy in computing and communications (TrustCom) (pp. 295–302). IEEE.
19.
go back to reference Chen, Y.-R., Tygar, J., & Tzeng, W.-G. (2011). Secure group key management using uni-directional proxy re-encryption schemes. In INFOCOM, 2011 proceedings IEEE (pp. 1952–1960). IEEE. Chen, Y.-R., Tygar, J., & Tzeng, W.-G. (2011). Secure group key management using uni-directional proxy re-encryption schemes. In INFOCOM, 2011 proceedings IEEE (pp. 1952–1960). IEEE.
20.
go back to reference Ali, M., Dhamotharan, R., Khan, E., Khan, S. U., Vasilakos, A. V., Li, K., et al. (2017). SeDaSC: Secure data sharing in clouds. IEEE Systems Journal, 11(2), 395–404.CrossRef Ali, M., Dhamotharan, R., Khan, E., Khan, S. U., Vasilakos, A. V., Li, K., et al. (2017). SeDaSC: Secure data sharing in clouds. IEEE Systems Journal, 11(2), 395–404.CrossRef
21.
go back to reference Zhang, L., Wu, Q., Mu, Y., & Zhang, J. (2016). Privacy-preserving and secure sharing of PHR in the cloud. Journal of Medical Systems, 40(12), 267.CrossRef Zhang, L., Wu, Q., Mu, Y., & Zhang, J. (2016). Privacy-preserving and secure sharing of PHR in the cloud. Journal of Medical Systems, 40(12), 267.CrossRef
22.
go back to reference Rao, Y. S. (2017). A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Generation Computer Systems, 67, 133–151.CrossRef Rao, Y. S. (2017). A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Generation Computer Systems, 67, 133–151.CrossRef
Metadata
Title
ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
Authors
V. Sri Vigna Hema
Ramesh Kesavan
Publication date
08-05-2019
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2019
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06450-7

Other articles of this Issue 2/2019

Wireless Personal Communications 2/2019 Go to the issue