Research Article | Open Access | Download PDF
Volume 4 | Issue 3 | Year 2013 | Article Id. IJCTT-V4I3P120 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I3P120
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds
Shilpa Elsa Abraham
Citation :
Shilpa Elsa Abraham, "Distributed Attribute Based Encryption for Patient Health Record Security under Clouds," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 3, pp. 296-300, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I3P120
Abstract
Patient Health Records (PHR) is maintained in the centralized server to maintain the patient’s personal and diagnosis information. The patient records should be maintained with privacy and security. The privacy mechanism protects the sensitive attributes. The security schemes are used to protect the data from public access. Patient data can be accessed by different people. Each authority is assigned with access permission for a set of attributes. The data access control and privacy management is a complex task in the patient health record management process. Cloud computing environment supports storage spaces for patient health record management process. Data owners update the patient data into third party cloud data centers. The attribute based encryption (ABE) scheme is used to secure the patient records for selected sensitive attributes. Multiple owners can access the same data values. The Multi Authority Attribute Based Encryption (MA-ABE) scheme is used to provide multiple authority based access control mechanism. The MA-ABE model is not tuned to provide identity based access mechanism. Distributed storage model is not supported in the MA-ABE model. The proposed system is designed to provide identity based encryption facility. The attribute based encryption scheme is enhanced to handle distributed attribute based encryption process. Data update and key management operations are tuned for multi user access environment.
Keywords
Personal health records, cloud computing, fine-grained access control, multi-authority attribute-based encryption, distributed environment
References
[1] M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings,” in SecureComm’10, Sept. 2010, pp. 89–106.
[2] M. Li, W. Lou, and K. Ren, “Data security and privacy in wireless body area networks,” IEEE Wireless Communications Magazine, Feb. 2010.
[3] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword search over encrypted personal health records in cloud computing,” in ICDCS ’11, Jun. 2011.
[4] A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” Advances in Cryptology–EUROCRYPT, pp. 568–588, 2011.
[5] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in ASIACCS’10, 2010.
[6] S. Narayan, M. Gagn´e, and R. Safavi-Naini, “Privacy preserving ehr system using attribute-based infrastructure,” ser. CCSW ’10, 2010, pp. 47–52.
[7] X. Liang, R. Lu, X. Lin, and X. S. Shen, “Patient self-controllable access policy on phi in ehealthcare systems,” in AHIC 2010, 2010.
[8] X. Liang, R. Lu, X. Lin, and X. S. Shen, “Ciphertext policy attribute based encryption with efficient revocation,”Technical Report, University of Waterloo, 2010.
[9] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE INFOCOM’10, 2010.
[10] C. Dong, G. Russello, and N. Dulay, “Shared and searchable encrypted data for untrusted servers,” in Journal of Computer Security, 2010.
[11] S. Ruj, A. Nayak, and I. Stojmenovic, “Dacc: Distributed access control in clouds,” in 10th IEEE TrustCom, 2011.
[12] Ming Li, Shucheng Yu, and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attributebased Encryption”, IEEE Transactions On Parallel And Distributed Systems 2012.
[13] S. M¨ uller, S. Katzenbeisser, and C. Eckert, “Distributed attribute based encryption,”Information Security and Cryptology–ICISC 2008, pp. 20–36, 2009.
[14] “Privacy-preserving personal health record system using attribute-based encryption,” POLYTECHNIC INSTITUTE, 2011.
[15] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in ASIACCS’10, 2010.