MPPSE : Multi-Source Privacy-Preserving Symmetric Encryption scheme over Personal Health Record

Authors(2) :-Banoth Seetha Ramulu, H. Balaji

Cloud-Centered Personal Health Record systems (CC-PHR) have great prospective in enabling the managing of individual health records. Security and privacy concerns are among the main obstacles for the wide adoption of CC-PHR systems. In this paper, we consider a multi-source CC-PHR system in which multiple data providers such as hospitals and physicians are authorized by individual data owners to upload their personal health data to an untrusted public cloud. The health data are submitted in an encrypted form to ensure data security, and each data provider also submits encrypted data indexes to enable queries over the encrypted data. We propose a unique Multi-Source Privacy-Preserving Symmetric Encryption (MPPSE) scheme whereby the cloud can merge the encrypted data indexes from multiple data providers without knowing the index content. MPPSE enables efficient and privacy-preserving query processing in that a data user can submit a single data query the cloud can process over the encrypted data from all related data providers without knowing the query content. We also propose an enhanced scheme, MPPSE+, to more efficiently support the data queries by hierarchical data providers. Extensive analysis and experiments over real datasets demonstrate the efficacy and efficiency of MPPSE and MPPSE+.

Authors and Affiliations

Banoth Seetha Ramulu
Associate Professor, Department of CSE,Vardhaman College of Engineering, Shamshabad, Hyderabad, TS, India
H. Balaji
Associate Professor, Department of CSE, Sreenidhi Institute of Science and Technology, Ghatkesar, Hyderabad, TS, India

Authorization Query, Cloud Computing, Personal Health Record, Privacy-Preserving Query

  1. C. Wang, B. Zhang, K. Ren, J. Roveda, C. Chen, Z. Xu, “A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing,” in INFOCOM’14, Toronto, Canada, 2014.
  2. J. Sun, X. Zhu, C. Zhang, Y. Fang, “HCPP: Cryptography based secure ehr system for patient privacy and emergency healthcare,” in ICDCS’11, Minneapolis, Minnesota, 2011.
  3. M. Li, S. Yu, N. Cao, W. Lou, “Authorized private keyword search over encrypted data in cloud computing,” in ICDCS’11, Minneapolis, Minnesota, 2011.
  4. J. Benaloh, M. Chase, E. Horvitz, K. Lauter, “Patient controlled encryption: ensuring privacy of electronic medical records,” in: ACM workshop on CCS’09, New York, NY, 2009.
  5. M. Li, S. Yu, Y. Zheng, K. Ren, W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE T Parall Distr., vol. 24, no. 1, pp. 131 - 143, 2013.
  6. M. Li, S. Yu, K. Ren, W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multiowner settings,” in SecureComm’10, Singapore, 2010.
  7. X. Ma, Y. Zhu, X. Li, “An efficient and secure ridge regression outsourcing scheme in wearable devices,” Computers & Electrical Engineering, 2017, DOI: 10.1016/j.compeleceng.2017.07.019.
  8. J. Liu, X. Huang, J. Liu, “Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption,” Future Gener Comp Sy., vol. 52, pp. 67 - 76, 2015.
  9. P. Scheuermann, M. Ouksel, “Multidimensional B-trees for associative searching in database systems,” Inform Syst., vol. 7, no. 2, pp. 123 - 137, 1982.
  10. K. Xue, J. Hong, Y. Xue, D. Wei, N. Yu, P. Hong, “CABE: A New Comparable Attribute-based Encryption Construction with 0-Encoding and 1-Encoding,” IEEE Trans Comput., vol. 66, no. 9, pp. 1491 - 1503, 2017.
  11. K. Xue, S. Li, J. Hong, Y. Xue, N. Yu, P. Hong, “Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving,” IEEE Trans Inf Forensics Secur., vol. 12, no. 7, pp. 1596 - 1608, 2017.
  12. R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in CCS’06, Alexandria, VA, 2006.
  13. Y. Zhu, Z. Huang, T. Takagi, “Secure and Controllable k-NN Query over Encrypted Cloud Data with Key Confidentiality,” J Parallel Distr Com, vol. 89, no. C, pp. 1 - 12, 2016.
  14. D. Song, D. Wagner, A. Perrig, “Practical techniques for searches on encrypted data,” in IEEE S&P’00, Berkeley, CA, 2000.
  15. D. Boneh, G. Crescenzo, R. Ostrovsky, G. Persiano, “Public key encryption with keyword search,” in EUROCRYP’04, Interlaken, Switzerland, 2004.
  16. Y. Zhu, Z. Wang, Y. Zhang, “Secure k-NN Query on Encrypted Cloud Data with Limited Key-disclosure and Offline Data Owner,” in PAKDD’16, Auckland, New Zealand, 2016.
  17. B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, Y. Wu, “A framework for efficient storage security in RDBMS,” in EDBT’04, Heraklion, Crete, Greece, 2004.
  18. Q. Liu, C. C. Tan, J. Wu, G. Wang, “Efficient information retrieval for ranked queries in cost-effective cloud environments,” in INFOCOM’12, Orlando, FL, 2012.
  19. Y. Zhu, Z. Wang, J. Wang, “Collusion-Resisting Secure Nearest Neighbor Query over Encrypted Data in Cloud,” in IWQoS’16, Beijing, China, 2016.
  20. R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, “Order preserving encryption for numeric data,” in SIGMOD’04, New York, NY, 2004.
  21. Q. Liu, C. C. Tan, J. Wu, G. Wang, “Cooperative private searching in clouds,” J Parallel Distr Com, vol. 72, no. 8, pp. 1019 - 1031, 2012.
  22. A. Boldyreva, N. Chenette, A. O’Neill, “Order-preserving encryption revisited: Improved security analysis and alternative solutions,” in CRYPTO’11, Santa Barbara, CA, 2011.
  23. P.FARZANA, A.HARSHAVARDHAN,” Integrity Auditing for Outsourced Dynamic Cloud Data with Group User Revocation.” International Journal of Computer Engineering in Research Trends., vol.2, no.11, pp. 877-881, 2015.
  24. N. Meghasree, U.Veeresh and Dr.S.Prem Kumar,” Multi Cloud Architecture to Provide Data Privacy and Integrity.” International Journal of Computer Engineering in Research Trends., vol.2, no.9, pp. 558-564, 2015.
  25. A.Shekinah prema sunaina,” Decentralized Fine-grained Access Control scheme for Secure Cloud Storage data.” International Journal of Computer Engineering in Research Trends., vol.2, no.7, pp. 421-424, 2015.
  26. P. Rizwana khatoon and Dr.C.Mohammed Gulzar ,” SecCloudPro:A Novel Secure Cloud Storage System for Auditing and Deduplication.” International Journal of Computer Engineering in Research Trends., vol.3, no.5, pp. 210-215, 2016.
  27. B.Sameena Begum, P.Ragha Vardhini,” Augmented Privacy-Preserving Authentication Protocol by Trusted Third Party in Cloud.” International Journal of Computer Engineering in Research Trends., vol.2, no.5, pp. 378-382, 2015.

Publication Details

Published in : Volume 1 | Issue 3 | November-December 2016
Date of Publication : 2016-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 69-75
Manuscript Number : CSEIT1831521
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Banoth Seetha Ramulu, H. Balaji, "MPPSE : Multi-Source Privacy-Preserving Symmetric Encryption scheme over Personal Health Record", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 1, Issue 3, pp.69-75, November-December-2016.
Journal URL :

Article Preview