Data Access Control of Personal Health Records using Cryptography

Authors

  • Divya G C  Assistant Professor, VI Semester Department of CSE, MIT, Davangere, Karnataka, India
  • Anupashree C A  Assistant Professor, VI Semester Department of CSE, MIT, Davangere, Karnataka, India

Keywords:

PHR systems; attribute set based encryption; access control; user revocation; health cloud.

Abstract

The goal of real health care reform must be high quality, universal coverage in cost effective way. Personal Health Record (PHR) systems plays prerequisite act in digital transformation of healthcare.PHR health systems turn out many over and above features like scrutinize one s health related information ,secure transmission and traverse the same data with health care providers. A cloud facilitated PHR systems bloats the contingency for PHR systems to co relate with our systems in health information executive system environments. An individual human being who is enduring a disorder needs to inscribe (encrypt) his/her data before transmitting it in cloud since the patients will lose their physical access to their health data accumulated in cloud servers.The callout assert here is to procure fine grained data ingresss control onm encrypted PHR data in an effectual and ascendable manner. In PHR Systems there are multifarious owners or patients & extant data connection & access control tactics are designed for sinle-authority /owner .The proposed scheme derives flexibility ,scalablity & fin grined patient centic data acces limitation scheme called revovable multi authority attribute set based encryption.(R-MA-ASBE)

References

  1. Li M, Yu S, Zhen Y, Ren K, Lou W. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption’, IEEE Transactions on Parallel and Distributed Systems, vol.24, no.1, 2013; 131-143.
  2. Yang K, Jia X. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage. IEEE Transactions on Parallel and Distributed Systems, vol.25, no.7, 2014; p.1735-1744.
  3. Yang D, Yu Y. An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. Information Security Practice and Experience, Lecture Notes in Computer Science, Springer, vol.8434, 2014; 448-461.
  4. Yang K, Jia X, Ren K. Attribute-based fine-grained access control with efficient revocation in cloud storage systems. ASIA CCS’13 Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, 2013; 523-528.
  5. Ruj S, Nayak A, Stojmenovic I. DACC: Distributed Access Control in Clouds,’ Proc. 10th IEEE Int’l Conf. TrustCom, 2011; p.91-98.
  6. Jahid S, Mittal P, Borisov. Easier: encryption-based access control in social networks with efficient revocation. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS’11), ACM, 2011; p.411-415.
  7. Hur J, Noh DK. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems. IEEE Trans. Parallel Distrib. Syst. vol.22, no.6, 2011; p.1214-1221.
  8. Bobba R, Khurana H, Prabhakaran M. Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. Computer Security – ESORICS, Lecture Notes in Computer Science , Springer Berlin Heidelberg, vol.5789, 2009; p.587-604.
  9. Chase M. Multi-authority Attribute Based Encryption. TCC, Lecture Notes in Computer Science, Springer, vol.4392, 2007; p.515- 534.
  10. Kamara S, Lauter, K. Cryptographic Cloud Storage. Proceedings 14th International Conf. on Financial Cryptography and Data Security, 2010; p.136-149.
  11. Yu S, Wang C, Ren K, Lou W. Achieving secure, scalable, and fine-grained data access control in cloud computing. Proceedings of the 29th IEEE International Conference on Computer Communications, 2010; p.1-9.
  12. Narayan S, Gagne M, Naini, RS. Privacy preserving EHR system using attribute-based infrastructure. CCSW’10 Proceedings of the 2010 ACM workshop on Cloud Computing Security workshop, ACM, 2010; p.47-52.
  13. Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. Information Security Applications, Lecture Notes in Computer Science, Springer, vol.5932, 2009; p.309-323.
  14. Bethencourt J, Sahai A, Waters B. Ciphertext-policy Attribute- Based Encryption. Proceedings of the IEEE Symposium on security and privacy, 2007; p.321-334.
  15. Chase M, Chow SM. Improving privacy and security in multi- authority attribute-based encryption. Proceedings of the 16th ACM conference on Computer and communications security, ACM, p.121-130.
  16. Markle Foundation. The Personal Health Working Group. Markle Foundation, 2003; http://www.providersedge.com/ehdocs.
  17. CP-ABE library http://acsc.cs.utexas.edu/cpabe/.

Downloads

Published

2018-05-08

Issue

Section

Research Articles

How to Cite

[1]
Divya G C, Anupashree C A, " Data Access Control of Personal Health Records using Cryptography, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 6, pp.298-306, May-June-2018.