Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption?Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 2)
Publication Date: 2014-02-28
Authors : Y.B.Gurav Manjiri Deshmukh;
Page : 617-625
Keywords : Personal health records; cloud computing; data privacy; fine-grained access control; attribute-based encryption;
Personal health record is maintain in the centralize server to maintain patient’s personal and diagnosis information. Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. The security schemes are used to protect personal data from public access. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing .In this paper we propose novel patient-centric framework and suite of mechanism for data access control to PHR’s stored in semi-trusted servers Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each patient’s PHR file. Data owner update the personal data into third party cloud data centers. Multiple data owners can access the same data values. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios.
Other Latest Articles
- APPLICATION OF STATISTICAL MODELS TO THE COLLABORATIVE PUBLICATIONS IN BIOINFORMATICS?
- A Review on Image Dehazing Methods?
- Lane Detection Techniques - A Review?
- Gas Level Detection and Leakage Monitoring System using a Specific Technique?
- AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA?
Last modified: 2014-02-27 03:27:08