SHIELDING OF HEALTH RECORDS CONFIDENTIALITY IN CLOUD COMPUTING

Swathi Lakshmi Rangudu, Ch.Subba Reddy, T. Shesagiri

Abstract


For the past few years, the technology of cloud computing has the extreme growth sections in the field of infrastructure and permits the consumers to make usage of applications devoid of installation and by means of internet access the personal files. Designing a competent and secure scheme of data sharing intended for groups in the cloud is not an uncomplicated mission because of the tricky issues. Well-organized methods which permit on-demand data accuracy confirmation on behalf of cloud users have to be considered in order to attain the assurances of cloud data integrity and accessibility and apply the excellence of cloud storage service. In the cloud computing, a novel structural design was proposed for the purpose of protecting and sharing of the personal health records and is both scalable and well-organized all the way through functioning and simulation. An attribute-based infrastructure is proposed, for the purpose of electronic healthcare records systems where by means of a broadcast difference of cipher text policy attribute-based encryption allows straight revocation for record files of each patient’s electronic healthcare records. For the owners and users which are different from preceding works in protected data outsourcing, various data owner scenario were mainly focussed and into various security domains users in the personal health record system are separated which greatly reduces the difficulty of key organization. In order to achieve fine grained and access control to scalable data intended for individual health records we make usage of attribute based encryption technique for encrypting the personal health record of every file.

Keywords


Physical Health Record; Attribute Based Encryption; Patient Record;

References


L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes,” 2009.

H. L¨ohr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health cloud,” in Proceedings of the 1st ACM International Health Informatics Symposium, ser. IHI ’10, 2010, pp. 220–229.

“At risk of exposure – in the push for electronic

medical records, concern is growing about how well privacy can be safeguarded,” 2006. [Online]. Available: http://articles.latimes.com/2006/jun/26/health/he-privacy26

J. A. Akinyele, C. U. Lehmann, M. D. Green, M. W. Pagano, Z. N. J. Peterson, and A. D. Rubin, “Self-protecting electronic medical records using attribute-based encryption,” Cryptology ePrint Archive, Report 2010/565, 2010, http://eprint.iacr.org/.

S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Over-encryption: management of access control evolution on outsourced data,” in VLDB ’07, 2007, pp. 123–134.

M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attribute-based systems,” Journal of Computer Security, vol. 18, no. 5, pp. 799–837, 2010.

H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” Wireless Communications,

IEEE, vol. 11, no. 1, pp. 38 – 47, feb 2004.

C. Dong, G. Russello, and N. Dulay, “Shared and searchable encrypted data for untrusted servers,” in Journal of Computer Security, 2010.

J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 99, no. PrePrints, 2010.

S. Narayan, M. Gagn´e, and R. Safavi-Naini, “Privacy preserving ehr system using attribute-based infrastructure,” ser. CCSW ’10, 2010, pp. 47–52.

S. M¨ uller, S. Katzenbeisser, and C. Eckert, “Distributed attributebased encryption,” Information Security and Cryptology–ICISC 2008,

pp. 20–36, 2009.

J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled encryption: ensuring privacy of electronic medical records,” in CCSW ’09, 2009, pp. 103–114

S. Ruj, A. Nayak, and I. Stojmenovic, “Dacc: Distributed access control in clouds,” in 10th IEEE TrustCom, 2011.

——, “Privacy-preserving personal health record system using attribute-based encryption,” Master’s thesis, WORCESTER POLYTECHNIC

INSTITUTE, 2011.

L. Ibraimi, M. Asim, and M. Petkovic, “Secure management of personal health records by applying attribute-based encryption,” Technical Report, University of Twente, 2009.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.