Encryption Schemes for Securing Cloud-based PHR Systems

Authors

  • Suresh S Dept. of CSE, Royal College of Engineering and Technology, Akkikavu, Kerala, India

Keywords:

Personal Health Record (PHR), Cloud Computing ; Attribute Based Encryption (ABE), MA-ABE, Proactive MA-ABE, CA, Data Privacy, Fine-grained access control

Abstract

Presently, Personal Health Records are widely used by people not only to store their health details, but also to share their health information among doctors, friends, relatives, medical organizations etc. Health records are now stored and shared with the help of cloud services. The sensitive nature of these health records makes it vulnerable to attacks. To ensure privacy of health information, the best method is to encrypt it. In this paper, Attribute Based Encryption and its variants are studied so that they can be used for developing an efficient health record sharing scheme which is more flexible and scalable.

References

M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure Attribute Based Systems,” Journal of Computer Security, vol. 18, no. 5, pp. 799–837, 2010.

V. Goyal, O.Pandey, A. Sahai, and B. Waters. “Attribute- Based Encryption for Fine-grained Access Control of Encrypted Data”, Proc. 13th ACM Conf. Computer and Comm. Security (CCS ’06), pp. 89-98, 2006.

D.Boneh and M. Franklin. “Identity-Based Encryption from the Weil Pairing.” Proc. of CRYPTO’01, Santa Barbara, California, USA, 2001.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy Attribute Based encryption,” in IEEE S& P ’07, 2007, pp. 321- 334.

Ramasamy S, Vahidhunnisha, ” Survey on Multi Authority Attribute Based Encryption for Personal Health Record in Cloud Computing”, International Journal of Latest Trends in Engineering and Technology, November 2013, pp.223- 229.

Herzberg etc, “proactive secrete sharing(PSS),” in 1995

Cheng-chir Lee, Pei-shan C,” A survey on ABE scheme of Access control in cloud environment, vol.15, no.4, July 2013, pp.231-240.

Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao,”Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority,” INDOCRYPT, 2008, pp. 426-436.

Neetha Xavier, “Security of PHR in cloud computing using ABE technique”, International Journal of Communication and Computer Technologies, volume 01-No.72 issue: 07, Nov 2013, pp. 265-269.

S.Jahid, P.Mittal, N.Borisov,”Easier: Encryption- Based Access Control in Social Networks with Efficient Revocation,” Proc. ACMSynp. Information, Computer and Comm.Security, Mar 2011.

Downloads

Published

2014-12-31

How to Cite

[1]
S. Suresh, “Encryption Schemes for Securing Cloud-based PHR Systems”, Int. J. Comp. Sci. Eng., vol. 2, no. 12, pp. 6–10, Dec. 2014.

Issue

Section

Research Article