Preserving and Retrieving Health Records using Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption in Cloud
DOI:
https://doi.org/10.26438/ijcse/v6i9.150153Keywords:
Cloud, Health care, Keyword, Proxy, DelegatesAbstract
Electronic health records(EHR’s) allows the patient to create his own health information in a hospital and share the information with other doctors in other hospitals.EHR provides security to the personal information of users. For providing privacy and security to EHR’s we use SE(Searchable Encryption) which is a cryptographic technique that allows the user to search for a specific information in encrypted content. In this paper we have used conjunctive keyword search with designated tester and timer enabled proxy re-encryption function which is a time dependent SE scheme. Public key encryption with keyword search (PECK) allows the user to search on encrypted data without decrypting it. Sometimes the patient may want to provide access rights to others , it may be his doctor without revealing his private key. This can be accomplished using proxy re-encryption(PRE). Patients can provide partial access rights to others in a limited time period to perform search operations. The amount of time the third party can search and decrypt the encrypted documents can be controlled. The access rights can be revoked back when the time period expires. This prevents re-encryption of the entire document and generation of keys. A time server is used in the system to generate time tokens for users.
References
[1] J. C. Leventhal, J. A. Cummins, P. H. Schwartz, D. K. Martin, and W. M. Tierney, “Designing a system for patients controlling providers’ access to their electronic health records: Organizational and technical challenges,” J. General Internal Med., vol. 30, no. 1, pp. 17–24, 2015.
[2] Microsoft. Microsoft HealthVault. [Online]. Available: http://www. healthvault.com, accessed May 1, 2015.
[3] J. W. Byun and D. H. Lee, “On a security model of conjunctive keywordsearch over encrypted relational database,” J. Syst. Softw., vol. 84, no. 8,pp. 1364–1372, 2011.
[4] M. Ding, F. Gao, Z. Jin, and H. Zhang, “An efficient public keyencryption with conjunctive keyword search scheme based on pairings,”in Proc. 3rd IEEE Int. Conf. Netw. Infrastruct. Digit. Content (IC-NIDC),Beijing, China, Sep. 2012, pp. 526–530. [5]J. Baek, R. Safavi-Naini, and W. Susilo, “Public key encryption withkeyword search revisited,” in Proc. Int. Conf. ICCSA, vol. 5072. Perugia, Italy, Jun./Jul. 2008, pp. 1249–1259.
[6]C. Hu and P. Liu, “An enhanced searchable public key encryptionscheme with a designated tester and its extensions,” J. Comput., vol. 7, no. 3, pp. 716–723, 2012
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
