Skip to main content
Erschienen in: Health and Technology 3-4/2015

01.12.2015 | Original Paper

Secure architecture to manage EHR’s in cloud using SSE and ABE

verfasst von: Gandikota Ramu, B. Eswara Reddy

Erschienen in: Health and Technology | Ausgabe 3-4/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing turns up as an advanced computing model in all business domains. It is a novel interactive data model to realize industries and users who store data in cloud servers. The healthcare sector is one of the major industries for working with the enormous amount of data. With the advent of cloud computing, many healthcare organizations are motivated towards outsourcing their medical records, which are called Electronic Health Records (EHR’s) from local sites to the cloud environment. Outsourcing this sensitive data (i.e. EHR’s) helps organizations to provide cost-effective personalized services to patients. However, securing outsourcing data is a problematic issue. This paper proposes a Searchable Symmetric Encryption (SSE) and Attribute-Based Encryption (ABE) secure architecture to build privacy in the health care systems using the private cloud. Our system provides efficient key management using a pseudorandom number generator to avoid unauthorized access and preserving privacy in EHR’s storage. With the help of modified SSE, we can hide both keyword and access pattern, and improve search efficiency. The system provides EHR’s access in the emergency (when data owner does not meet the requirements) with the help of the ABE. Role-based login is another technique that is provided to monitor EHR’s activities to prevent misbehavior. Through the analysis of the proposed architecture, the privacy and efficiency in the cloud data is guaranteed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Dong N, Hugo J, Pang J. Challenges in e-health: From enabling to enforcing privacy, in Foundations of Health Informatics Engineering and System. Berlin: Springer; 2012. p. 195–206.CrossRef Dong N, Hugo J, Pang J. Challenges in e-health: From enabling to enforcing privacy, in Foundations of Health Informatics Engineering and System. Berlin: Springer; 2012. p. 195–206.CrossRef
5.
Zurück zum Zitat Shamir A. Identity-based cryptosystems and signature schemes, in Advances in cryptology. Berlin: Springer-Verlag; 1985. p. 47–53. Shamir A. Identity-based cryptosystems and signature schemes, in Advances in cryptology. Berlin: Springer-Verlag; 1985. p. 47–53.
6.
Zurück zum Zitat Sahai A, Waters B. Fuzzy identity-based encryption, in Advances in cryptology. Berlin: Springer-Verlag; 2005. p. 457–73. Sahai A, Waters B. Fuzzy identity-based encryption, in Advances in cryptology. Berlin: Springer-Verlag; 2005. p. 457–73.
7.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data, in Proc. 13th CCS. 2006; 89–98. Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data, in Proc. 13th CCS. 2006; 89–98.
8.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute based encryption, in proc. IEEE SP, May 2007. p. 321–334. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute based encryption, in proc. IEEE SP, May 2007. p. 321–334.
10.
Zurück zum Zitat Benaloh J, Chase M, Horvitz E, Lauter K. Patient controlled encryption: Ensuring privacy of electronic medical records, in Proc. ACM Workshop Cloud Comput Security. 2009; 103–114. Benaloh J, Chase M, Horvitz E, Lauter K. Patient controlled encryption: Ensuring privacy of electronic medical records, in Proc. ACM Workshop Cloud Comput Security. 2009; 103–114.
12.
Zurück zum Zitat Reddy BE, Kumar TVS, Ramu G. An Efficient Cloud Framework for Health Care Monitoring System. 2012 International symposium on cloud and services computing 2012 IEEE, doi:10.1109/ISCOS.2012.11. Reddy BE, Kumar TVS, Ramu G. An Efficient Cloud Framework for Health Care Monitoring System. 2012 International symposium on cloud and services computing 2012 IEEE, doi:10.​1109/​ISCOS.​2012.​11.
14.
Zurück zum Zitat Li M, Yu S, Zheng Y, Ren K, Lou W. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst. 2013;24(1):131–43.CrossRef Li M, Yu S, Zheng Y, Ren K, Lou W. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst. 2013;24(1):131–43.CrossRef
15.
Zurück zum Zitat Chase M, Chow SSM. Improving privacy and security in multiauthority attribute-based encryption, in Proc. ACM Conf Comput Commun Secur. 2009; 121–130. Chase M, Chow SSM. Improving privacy and security in multiauthority attribute-based encryption, in Proc. ACM Conf Comput Commun Secur. 2009; 121–130.
16.
Zurück zum Zitat Chow SSM. New privacy-preserving architectures for identity−/attribute-based encryption Ph.D. dissertation. Courant Inst Math Sci. New York University, New York 2010. Chow SSM. New privacy-preserving architectures for identity−/attribute-based encryption Ph.D. dissertation. Courant Inst Math Sci. New York University, New York 2010.
17.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B. Attributed-based encryption for fine-grained access control of encrypted data, in Proc. ACM Conf. Comput Commun Secur. 2006; 89–98. Goyal V, Pandey O, Sahai A, Waters B. Attributed-based encryption for fine-grained access control of encrypted data, in Proc. ACM Conf. Comput Commun Secur. 2006; 89–98.
18.
Zurück zum Zitat Yu S, Wang C, Ren K, Lou W. Achieving secure, scalable, and fine-grained data access control in cloud computing, presented at the IEEE conf. Comput Commun. San Diego, 2010. Yu S, Wang C, Ren K, Lou W. Achieving secure, scalable, and fine-grained data access control in cloud computing, presented at the IEEE conf. Comput Commun. San Diego, 2010.
19.
Zurück zum Zitat Sun J, Zhang C, Zhang Y, Fang Y. An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans Parallel Distrib Syst. 2010;21(9):1227–39.MathSciNetCrossRef Sun J, Zhang C, Zhang Y, Fang Y. An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans Parallel Distrib Syst. 2010;21(9):1227–39.MathSciNetCrossRef
20.
Zurück zum Zitat Leng C, Yu H, Wang J, Huang J. Securing personal health records in the cloud by enforcing sticky policies. Telkomnika Indonesian J Elect Eng. 2013;11(4):2200–8. Leng C, Yu H, Wang J, Huang J. Securing personal health records in the cloud by enforcing sticky policies. Telkomnika Indonesian J Elect Eng. 2013;11(4):2200–8.
21.
Zurück zum Zitat Lin H, Shao J, Zhang C, Fang Y. CAM: cloud-assisted privacy preserving mobile health monitoring. IEEE Trans Inf Forensics Secur. 2013;8(6):985–97.CrossRef Lin H, Shao J, Zhang C, Fang Y. CAM: cloud-assisted privacy preserving mobile health monitoring. IEEE Trans Inf Forensics Secur. 2013;8(6):985–97.CrossRef
22.
Zurück zum Zitat Liu H, Ning H, Xiong Q, Yang LT. Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Trans Parallel Distrib Syst. 2015;26(1):241–51.CrossRef Liu H, Ning H, Xiong Q, Yang LT. Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Trans Parallel Distrib Syst. 2015;26(1):241–51.CrossRef
Metadaten
Titel
Secure architecture to manage EHR’s in cloud using SSE and ABE
verfasst von
Gandikota Ramu
B. Eswara Reddy
Publikationsdatum
01.12.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
Health and Technology / Ausgabe 3-4/2015
Print ISSN: 2190-7188
Elektronische ISSN: 2190-7196
DOI
https://doi.org/10.1007/s12553-015-0116-0

Weitere Artikel der Ausgabe 3-4/2015

Health and Technology 3-4/2015 Zur Ausgabe