Cloud Based Secure Storage Dynamics for Personal Health Records

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - September Issue 2013 by IJCTT Journal
Volume-4 Issue-9                           
Year of Publication : 2013
Authors :Sravan Kumar.Ch , Srikanth Sreerama

MLA

Sravan Kumar.Ch , Srikanth Sreerama"Cloud Based Secure Storage Dynamics for Personal Health Records"International Journal of Computer Trends and Technology (IJCTT),V4(9):3345-3348 September Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- Cloud computing has become an attractive and viable solution for outsourcing data. People can use cloud storage in pay per use fashion without capital investment. Enterprises from various industries are moving their data to cloud. Personal Health Records (PHRs) is a new model pertaining to health domain which has huge data that can be outsourced to cloud. Unlike data of other domains, the data of healthcare domain is highly sensitive. The patient’s control over his record is very important. To achieve this PHR is encrypted before outsourcing it to cloud storage. There are many concerns pertaining to security such as privacy. Therefore scalable and secure sharing of such data is essential. Recently Li et al. proposed a scheme known as Multi-Authority ABE, which is based on Attribute Based Encryption (ABE). This encryption mechanism when used before outsourcing to cloud ensures that the data owner is assured complete security to his sensitive data. Concurrent and scalable sharing beside high degree of privacy is guaranteed in this scheme. In this paper we implement the scheme proposed by Li et al. with a prototype application that demonstrates the proof of concept. The empirical results revealed that the scheme is effective and support scalable and secure sharing of PHRs. .

 

References -
[1] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword search over encrypted personal health records in cloud computing,” in ICDCS ’11, Jun. 2011.
[2] H. Lohr, A.-R.Sadeghi, and M. Winandy, “Securing the e-health cloud,” in Proceedings of the 1st ACM International Health Informatics Symposium, ser. IHI ’10, 2010, pp. 220–229.
[3] “Google, microsoft say hipaa stimulus rule doesn’t apply to them,” http://www.ihealthbeat.org/Articles/2009/4/8/.
[4] “At risk of exposure – in the push for electronic medical records, concern is growing about how well privacy can be safeguarded,” 2006. [Online]. Available: http://articles.latimes.com/2006/jun/26/health/he-privacy26
[5] K. D. Mandl, P. Szolovits, and I. S. Kohane, “Public standards and patients’ control: how to keep electronic medical records accessible but private,” BMJ, vol. 322, no. 7281, p. 283, Feb. 2001.
[6] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled encryption: ensuring privacy of electronic medical record- s,” in CCSW ’09, 2009, pp. 103–114.
[7] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE INFOCOM’10, 2010.
[8] M. Li, W. Lou, and K. Ren, “Data security and privacy in wireless body area networks,” IEEE Wireless Communications Magazine, Feb. 2010.
[9] A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in ACM CCS, ser. CCS ’08, 2008, pp. 17–426.
[10] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes,” 2009.
[11] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in ASIACCS’10, 2010.
[12] S. Narayan, M. Gagn , and R. Safavi-Naini, “Privacy preserving e ehr system using attribute-based infrastructure,” ser. CCSW ’10, 2010, pp. 47–52.
[13] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in IEEE S& P ’07, 2007, pp. 321–334.

Keywords :— PHR, cloud computing, data privacy, attribute based encryption.