Skip to main content
Top

2023 | OriginalPaper | Chapter

Novel Approach for Improving Security and Confidentiality of PHR in Cloud Using Public Key Encryption

Authors : Chudaman Sukte, M. Emmanuel, Ratnadeep Deshmukh

Published in: Intelligent Communication Technologies and Virtual Mobile Networks

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Personal health records (PHR) are a new type of health information exchange that allows PHR possessor to share their personal health details with a wide range of people, inclusive of healthcare professionals, close relative and best friends. PHR details are typically externalization and kept in third-party cloud platforms, reducing PHR possessor of the load of managing their PHR details while improving health data accessibility. To ensure the secrecy of personal health records maintained in public clouds, encrypting the health details prior to uploading on the cloud is a typical practice. The secrecy of the information from the cloud is guaranteed since the cloud does not know the keys used to encrypt the information. Elliptic curve cryptography encryption is used to attain secure and systematic way to interact PHRs with re-encryption server.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mell P, Grance T (2011) The NIST definition of cloud computing. NIST, US Mell P, Grance T (2011) The NIST definition of cloud computing. NIST, US
2.
go back to reference Kadam S, Motwani D (2020) Blockchain based e-healthcare record system. In: International conference on image processing and capsule networks. Springer, Cham, pp 366–380 Kadam S, Motwani D (2020) Blockchain based e-healthcare record system. In: International conference on image processing and capsule networks. Springer, Cham, pp 366–380
3.
go back to reference Chu C, Chow S, Tzeng W (2014) Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans Parallel Distrib Syst 25(2), 468–477 Chu C, Chow S, Tzeng W (2014) Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans Parallel Distrib Syst 25(2), 468–477
4.
go back to reference Huang KH, Chang EC, Wang S-J (2014) A patient-centric access control scheme for personal health records in the cloud. In: Fourth international conference on networking and distributed computing Huang KH, Chang EC, Wang S-J (2014) A patient-centric access control scheme for personal health records in the cloud. In: Fourth international conference on networking and distributed computing
5.
go back to reference Chen YY, Lu JC, Jan JK (2012) A secure EHR system based on hybrid clouds. J Med Syst 36(5):3375–3384CrossRef Chen YY, Lu JC, Jan JK (2012) A secure EHR system based on hybrid clouds. J Med Syst 36(5):3375–3384CrossRef
6.
go back to reference Leng C, Yu H, Wang J, Huang J (2013) Securing personal health records in the cloud by enforcing sticky policies. TELKOMNIKA Indon J Electr Eng 11(4):2200–2208 Leng C, Yu H, Wang J, Huang J (2013) Securing personal health records in the cloud by enforcing sticky policies. TELKOMNIKA Indon J Electr Eng 11(4):2200–2208
7.
go back to reference Khan AN, Kiah MLM, Madani SA, Ali M, Sham-shirband S (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Super Comput 68(2): 624–651 Khan AN, Kiah MLM, Madani SA, Ali M, Sham-shirband S (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Super Comput 68(2): 624–651
8.
go back to reference Wu R, Ahn GG-J, Hu H (2012) Secure sharing of electronic health records in clouds. In: 8th IEEE international conference on co llaborative computing: networking, applications and work work-sharing CollaborateCom), pp 711 711–718 Wu R, Ahn GG-J, Hu H (2012) Secure sharing of electronic health records in clouds. In: 8th IEEE international conference on co llaborative computing: networking, applications and work work-sharing CollaborateCom), pp 711 711–718
9.
go back to reference Abbas A, Khan SU (2014) A review on the state state-of -thethe-art privacy preserving approaches in E E-health clouds. IEEE J Biomed Health Inform 18(4):1431–1441 Abbas A, Khan SU (2014) A review on the state state-of -thethe-art privacy preserving approaches in E E-health clouds. IEEE J Biomed Health Inform 18(4):1431–1441
10.
go back to reference Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143 Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143
11.
go back to reference Xiao Z, Xiao Y (2012) Security and privacy in cloud computing. IEEE Commun Surv Tutor 15(2):1–17 Xiao Z, Xiao Y (2012) Security and privacy in cloud computing. IEEE Commun Surv Tutor 15(2):1–17
12.
go back to reference Pimple KU, Dongre NM (2021) Preserving and scrambling of health records with multiple owner access using enhanced break-glass algorithm. In: Computer networks, big data and IoT. Springer, Singapore, pp 483–495 Pimple KU, Dongre NM (2021) Preserving and scrambling of health records with multiple owner access using enhanced break-glass algorithm. In: Computer networks, big data and IoT. Springer, Singapore, pp 483–495
13.
go back to reference Jammu A, Singh H (2017) Improved AES for data security in E-health. Int J 8(5) Jammu A, Singh H (2017) Improved AES for data security in E-health. Int J 8(5)
14.
go back to reference Omotosho A et al (2015) A secure electronic prescription system using steganography with encryption key implementation. arXiv:1502.01264 Omotosho A et al (2015) A secure electronic prescription system using steganography with encryption key implementation. arXiv:​1502.​01264
15.
go back to reference Sri VB, Suryateja PS (2014) Using advanced encryption standard for secure and scalable sharing of personal health records in cloud. Int J Comput Sci Inf Technol (IJCSIT). ISSN 0975-9646 Sri VB, Suryateja PS (2014) Using advanced encryption standard for secure and scalable sharing of personal health records in cloud. Int J Comput Sci Inf Technol (IJCSIT). ISSN 0975-9646
16.
go back to reference Oh J-Y, Yang D-I, Chon K-H (2010) A selective encryption algorithm based on AES for medical information. Healthcare Inf Res 16(1):22–29 Oh J-Y, Yang D-I, Chon K-H (2010) A selective encryption algorithm based on AES for medical information. Healthcare Inf Res 16(1):22–29
17.
go back to reference Shin D, Sahama T, Gajanayake R (2013) Secured e-health data retrieval in DaaS and big data. In: 2013 IEEE 15th International conference on E-health networking, applications & services (Healthcom). IEEE Shin D, Sahama T, Gajanayake R (2013) Secured e-health data retrieval in DaaS and big data. In: 2013 IEEE 15th International conference on E-health networking, applications & services (Healthcom). IEEE
18.
go back to reference Abbas A, Khan SU (2014) A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J Biomed Health Inf 18(4):1431–1441 Abbas A, Khan SU (2014) A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J Biomed Health Inf 18(4):1431–1441
19.
go back to reference Ramakrishnan N, Sreerekha B (2013) Enhancing security of personal health records in cloud computing by encryption. Int J Sci Res (IJSR). ISSN (Online) 2319-064 (Index copernicus value) Ramakrishnan N, Sreerekha B (2013) Enhancing security of personal health records in cloud computing by encryption. Int J Sci Res (IJSR). ISSN (Online) 2319-064 (Index copernicus value)
20.
go back to reference Andi HK (2021) Analysis of serverless computing techniques in cloud software framework. J IoT Soc Mob Anal Cloud 3(3):221–234 Andi HK (2021) Analysis of serverless computing techniques in cloud software framework. J IoT Soc Mob Anal Cloud 3(3):221–234
21.
go back to reference Manoharan E, Samuel J (2021) A novel user layer cloud security model based on Chaotic Arnold transformation using fingerprint biometric traits. J Innov Image Process (JIIP) 3(01):36–51 Manoharan E, Samuel J (2021) A novel user layer cloud security model based on Chaotic Arnold transformation using fingerprint biometric traits. J Innov Image Process (JIIP) 3(01):36–51
22.
go back to reference Murthy S, Kavitha CR (2019) A smart and secure framework for IoT device based multimedia medical data. In: International conference on computational vision and bio inspired computing. Springer, Cham, pp 583–588 Murthy S, Kavitha CR (2019) A smart and secure framework for IoT device based multimedia medical data. In: International conference on computational vision and bio inspired computing. Springer, Cham, pp 583–588
23.
go back to reference Pooja NB. Secure mechanism for medical database using RSA Pooja NB. Secure mechanism for medical database using RSA
24.
go back to reference Au MH, Yuen TH, Liu JK, Susilo W, Jiang ZL (2017) A general framework for secure sharing of personal health records in cloud system. J Comput Syst Sci 90:46–62 Au MH, Yuen TH, Liu JK, Susilo W, Jiang ZL (2017) A general framework for secure sharing of personal health records in cloud system. J Comput Syst Sci 90:46–62
25.
go back to reference Akinyele J et al (2011) Securing electronic medical records using attribute-based encryption on mobile devices. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices. ACM Akinyele J et al (2011) Securing electronic medical records using attribute-based encryption on mobile devices. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices. ACM
27.
go back to reference Mugunthan SR (2019) Soft computing based autonomous low rate DDOS attack detection and security for cloud computing. J Soft Comput Paradigm (JSCP) 1(02):80–90 Mugunthan SR (2019) Soft computing based autonomous low rate DDOS attack detection and security for cloud computing. J Soft Comput Paradigm (JSCP) 1(02):80–90
28.
go back to reference Kumar D, Dr. Smys S. Enhancing security mechanisms for healthcare informatics using ubiquitous cloud. J Ubiquitous Comput Commun Technol 2(1):19–28 Kumar D, Dr. Smys S. Enhancing security mechanisms for healthcare informatics using ubiquitous cloud. J Ubiquitous Comput Commun Technol 2(1):19–28
Metadata
Title
Novel Approach for Improving Security and Confidentiality of PHR in Cloud Using Public Key Encryption
Authors
Chudaman Sukte
M. Emmanuel
Ratnadeep Deshmukh
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-1844-5_27