Skip to main content
Top

2021 | OriginalPaper | Chapter

Preserving and Scrambling of Health Records with Multiple Owner Access Using Enhanced Break-Glass Algorithm

Authors : Kshitij U. Pimple, Nilima M. Dongre

Published in: Computer Networks, Big Data and IoT

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing servers gives a stage for the clients to remotely store information and offer the information to everyone. Healthcare record management system (HRMS) has been developed as a tolerant-driven model for health-related data exchange. Classification of the common information, i.e., visit details, report details, etc., remains as a serious issue when patients utilize public cloud servers since it might be viewed by everyone. To guarantee the patient’s control over admittance to their own uncommon well-being records, it is a promising technique to encode the reports before redistributing and pick up the gain power to that data. Security introduction, adaptability in key association, and flexible access experience have remained the most essential difficulties toward accomplishing fine-grained, cryptographically endorsed data get the opportunity to control. This research work proposes an arrangement of systems for information get to control to healthcare record management system (HRMS) put away in outsider servers with classification of data into public and private data. In HRMS for accomplishing smooth and adaptable information get the chance to control, attribute-based encryption (ABE) methodologies are utilized to encode each patient’s HRMS record for getting to. While providing secure data outsourcing, the main concentration is the multiple owners of data. On account of this framework significantly diminishes the key administration unpredictability for information owners and clients, HRMS ensured a high level of patient security. With respect to emergency situations, a break-glass extraction method is introduced here to access the data in emergency situations with authorized keys.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wu J, Dong M, Ota K, Li J, Guan Z (2018) Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Netw Serv Manag 15:27–38CrossRef Wu J, Dong M, Ota K, Li J, Guan Z (2018) Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Netw Serv Manag 15:27–38CrossRef
2.
go back to reference Wu J, Dong M, Ota K, Li J, Guan Z (2018) FCSS: fog computing based content-aware filtering for security services in information centric social networks. IEEE Trans Emerg Top, Comput Wu J, Dong M, Ota K, Li J, Guan Z (2018) FCSS: fog computing based content-aware filtering for security services in information centric social networks. IEEE Trans Emerg Top, Comput
3.
go back to reference Guo L, Dong M, Ota K, Li Q, Ye T, Wu J, Li J (2017) A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet Things J 4:601–610CrossRef Guo L, Dong M, Ota K, Li Q, Ye T, Wu J, Li J (2017) A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet Things J 4:601–610CrossRef
4.
go back to reference Wu J, Ota K, Dong M, Li C (2016) A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4:416–424CrossRef Wu J, Ota K, Dong M, Li C (2016) A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4:416–424CrossRef
5.
go back to reference Dwivedi AD, Morawiecki P, Wójtowicz S (2018) Finding differential paths in ARX ciphers through nested monte-carlo search. Int J Electron Telecommun 64:147–150 Dwivedi AD, Morawiecki P, Wójtowicz S (2018) Finding differential paths in ARX ciphers through nested monte-carlo search. Int J Electron Telecommun 64:147–150
6.
go back to reference Dwivedi AD, Morawiecki P, Singh R, Dhar S (2018) Differential-linear and related key cryptanalysis of round-reduced scream. Inf Process Lett 136:5–8MathSciNetCrossRef Dwivedi AD, Morawiecki P, Singh R, Dhar S (2018) Differential-linear and related key cryptanalysis of round-reduced scream. Inf Process Lett 136:5–8MathSciNetCrossRef
7.
go back to reference Dwivedi AD, Srivastava G (2018) Differential cryptanalysis of round-reduced LEA. IEEE Access Dwivedi AD, Srivastava G (2018) Differential cryptanalysis of round-reduced LEA. IEEE Access
8.
go back to reference Dwivedi AD, Morawiecki P, Wójtowicz S (2017) Differential and rotational cryptanalysis of round-reduced MORUS. In: Proceedings of the 14th international joint conference on e-business and telecommunications, Madrid, Spain, 24–26 July 2017; pp 275–284 Dwivedi AD, Morawiecki P, Wójtowicz S (2017) Differential and rotational cryptanalysis of round-reduced MORUS. In: Proceedings of the 14th international joint conference on e-business and telecommunications, Madrid, Spain, 24–26 July 2017; pp 275–284
10.
go back to reference Dwivedi AD, Morawiecki P, Wójtowicz S (2017) Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, Madrid, Spain, 24–26 July 2017; pp. 501–506 Dwivedi AD, Morawiecki P, Wójtowicz S (2017) Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, Madrid, Spain, 24–26 July 2017; pp. 501–506
11.
go back to reference Luo L, Guojun QW (2016) Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20(9):1772–1775CrossRef Luo L, Guojun QW (2016) Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20(9):1772–1775CrossRef
12.
go back to reference Mao et al (2016) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Dependable Secure Comput 13.5:533–546 Mao et al (2016) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Dependable Secure Comput 13.5:533–546
13.
go back to reference Dwivedi AD, Kloucek M, Morawiecki P, Nikolic I, Pieprzyk J, Wójtowicz S (2017) SAT-based cryptanalysis of authenticated ciphers from the CAESAR competition. In: Proceedings of the 14th international joint conference on e-business and telecommunications, Madrid, Spain, 24–26 July 2017, pp 237–246 Dwivedi AD, Kloucek M, Morawiecki P, Nikolic I, Pieprzyk J, Wójtowicz S (2017) SAT-based cryptanalysis of authenticated ciphers from the CAESAR competition. In: Proceedings of the 14th international joint conference on e-business and telecommunications, Madrid, Spain, 24–26 July 2017, pp 237–246
14.
go back to reference Maw HA et al (2016) BTG-AC: Break-the-glass access control model for medical data in wireless sensor networks. IEEE J Biomed Health Inf 20(3):763–774CrossRef Maw HA et al (2016) BTG-AC: Break-the-glass access control model for medical data in wireless sensor networks. IEEE J Biomed Health Inf 20(3):763–774CrossRef
15.
go back to reference Li M, Yu S, Ren K, Lou W (2010) Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia S, Zhou J, (eds) Security and privacy in communication networks. Springer Berlin Heidelberg Li M, Yu S, Ren K, Lou W (2010) Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia S, Zhou J, (eds) Security and privacy in communication networks. Springer Berlin Heidelberg
16.
go back to reference Berlin/Heidelberg, Germany, 2010; pp 89–106 Berlin/Heidelberg, Germany, 2010; pp 89–106
17.
go back to reference Mandl KD, Markwell D, MacDonald R, Szolovits P, Kohane IS (2001) Public standards and patients’ control: how to keep electronic medical records accessible but private. BMJ 322:283–287CrossRef Mandl KD, Markwell D, MacDonald R, Szolovits P, Kohane IS (2001) Public standards and patients’ control: how to keep electronic medical records accessible but private. BMJ 322:283–287CrossRef
18.
go back to reference Wu J, Dong M, Ota K, Li J, Guan Z (2018) Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Netw Serv Manag 15:27–38 Wu J, Dong M, Ota K, Li J, Guan Z (2018) Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Netw Serv Manag 15:27–38
19.
go back to reference Sun W et al (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198CrossRef Sun W et al (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198CrossRef
20.
go back to reference Yang K et al (2016) Time-domain attribute-based access control for cloud-based video content sharing: a cryptographic approach. IEEE Trans Multimedia 18(5):940–950CrossRef Yang K et al (2016) Time-domain attribute-based access control for cloud-based video content sharing: a cryptographic approach. IEEE Trans Multimedia 18(5):940–950CrossRef
21.
go back to reference Shakya S (2019) An efficient security framework for data migration in a cloud computing environment. J Artif Intell 1(01):45–53 Shakya S (2019) An efficient security framework for data migration in a cloud computing environment. J Artif Intell 1(01):45–53
22.
go back to reference Suma V (2020) A novel information retrieval system for distributed cloud using hybrid deep fuzzy hashing algorithm. J Inf Technol 2(03):151–160 Suma V (2020) A novel information retrieval system for distributed cloud using hybrid deep fuzzy hashing algorithm. J Inf Technol 2(03):151–160
Metadata
Title
Preserving and Scrambling of Health Records with Multiple Owner Access Using Enhanced Break-Glass Algorithm
Authors
Kshitij U. Pimple
Nilima M. Dongre
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-0965-7_38