International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 9 | Year 2013 | Article Id. IJCTT-V4I9P170 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I9P170

Cloud Based Secure Storage Dynamics for Personal Health Records


Sravan Kumar.Ch , Srikanth Sreerama

Citation :

Sravan Kumar.Ch , Srikanth Sreerama, "Cloud Based Secure Storage Dynamics for Personal Health Records," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 9, pp. 3345-3348, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I9P170

Abstract

Cloud computing has become an attractive and viable solution for outsourcing data. People can use cloud storage in pay per use fashion without capital investment. Enterprises from various industries are moving their data to cloud. Personal Health Records (PHRs) is a new model pertaining to health domain which has huge data that can be outsourced to cloud. Unlike data of other domains, the data of healthcare domain is highly sensitive. The patient’s control over his record is very important. To achieve this PHR is encrypted before outsourcing it to cloud storage. There are many concerns pertaining to security such as privacy. Therefore scalable and secure sharing of such data is essential. Recently Li et al. proposed a scheme known as Multi-Authority ABE, which is based on Attribute Based Encryption (ABE). This encryption mechanism when used before outsourcing to cloud ensures that the data owner is assured complete security to his sensitive data. Concurrent and scalable sharing beside high degree of privacy is guaranteed in this scheme. In this paper we implement the scheme proposed by Li et al. with a prototype application that demonstrates the proof of concept. The empirical results revealed that the scheme is effective and support scalable and secure sharing of PHRs.

Keywords

PHR, cloud computing, data privacy, attribute based encryption.

References

[1] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword search over encrypted personal health records in cloud computing,” in ICDCS ’11, Jun. 2011.
[2] H. Lohr, A.-R.Sadeghi, and M. Winandy, “Securing the e-health cloud,” in Proceedings of the 1st ACM International Health Informatics Symposium, ser. IHI ’10, 2010, pp. 220–229.
[3] “Google, microsoft say hipaa stimulus rule doesn’t apply to them,” http://www.ihealthbeat.org/Articles/2009/4/8/.
[4] “At risk of exposure – in the push for electronic medical records, concern is growing about how well privacy can be safeguarded,” 2006. [Online]. Available: http://articles.latimes.com/2006/jun/26/health/he-privacy26
[5] K. D. Mandl, P. Szolovits, and I. S. Kohane, “Public standards and patients’ control: how to keep electronic medical records accessible but private,” BMJ, vol. 322, no. 7281, p. 283, Feb. 2001.
[6] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled encryption: ensuring privacy of electronic medical record- s,” in CCSW ’09, 2009, pp. 103–114.
[7] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE INFOCOM’10, 2010.
[8] M. Li, W. Lou, and K. Ren, “Data security and privacy in wireless body area networks,” IEEE Wireless Communications Magazine, Feb. 2010.
[9] A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in ACM CCS, ser. CCS ’08, 2008, pp. 17–426.
[10] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes,” 2009.
[11] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in ASIACCS’10, 2010.
[12] S. Narayan, M. Gagń , and R. Safavi-Naini, “Privacy preserving e ehr system using attribute-based infrastructure,” ser. CCSW ’10, 2010, pp. 47–52.
[13] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in IEEE S& P ’07, 2007, pp. 321–334.
[14] Ming Li Member, IEEE, Shucheng Yu, Yao Zheng, Kui Ren and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption”, IEEE, 2012. 
[15] S. Ruj, A. Nayak, and I. Stojmenovic, “Dacc: Distributed access control in clouds,” in 10th IEEE TrustCom, 2011.
[16] J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 99, no.PrePrints, 2010.
[17] S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Over-encryption: management of access control evolution on outsourced data,” in VLDB ’07, 2007, pp. 123–134.