Hybrid Cryptographic Access Control for Cloud based Electronic Health Records Systems
Keywords:
Electronic Health Record(EHR), Access Control,Location Awareness, Steganography.Abstract
Cloud based Electronic Health Record (EHR) systems are next generationâ€big data systems†for facilitating a) efficient and scalable storage, and b) to foster collaborative care, clinical research and development. Mobility and use of multiple mobile devices in collaborative healthcare intrigue robust privacy preservation. Thus, large scale EHR systems require secure access to privacy sensitive EHR data, data storage and management. We provide a comprehensive solution with i) a cryptographic role based technique to distribute session keys to establish communications and information retrieval using Kerberos protocol, ii) location and biometrics based authentication method to authorize the users and iii) a wavelet based steganographic technique to embed EHR data securely using ECG biometric as the host in a trusted cloud storage. Based on a comprehensive security analysis, our model proves to be a scalable, secure and a reliable model to access and manage EHR data.
References
- D. OLeary, Articial intelligence and big data, Intelligent Systems, IEEE, vol. 28, no. 2, pp. 96–99, 2013.
- E. E. Schadt, M. D. Linderman, J. Sorenson, L. Lee, and G. P. Nolan, Computational solutions to large-scale data management and analysis, Nature Reviews Genetics, vol. 11, no. 9, pp. 647–657, 2010.
- Australian Burea of Statistics, http://www.abs.gov.au/ausstats/abs%40.nsf/94713ad445ff 425ca25682000192af2/1647509ef7e25faaca2568a900154b63? OpenDocument.
- S. Pandey, W. Voorsluys, S. Niu, A. Khandoker, R. Buyya, An autonomic cloud environment for hosting ECG data analysis services, Future Generation Computer Systems, vol. 28, no. 1, pp. 147–154, 2012.
- U.S. Premarathne, I. Khalil, Z. Tari, and A. Zomaya. ”Cloud-based Utility Service Framework for Trust Negotiations using Federated Identity Management.”, IEEE Transactions on Cloud Computing, vol.99, pp.1-14, 2015.
- J. Marek, V. Bufalino, J. Davis, K. Marek, A. Gami, W. Stephan, and F. Zimmerman. ”Feasibility and findings of large-scale electrocardiographic screening in young adults:data from 32,561 subjects”, Heart Rhythm, vol.8, no.10, pp. 1555-1559, 2011.
- M. Kim and J. Leskovec, Multiplicative attribute graph model of real-world networks, Internet Mathematics, vol. 8, no. 1-2,pp. 113–160, 2012.
- N. Kumar, A. Berg, P. N. Belhumeur, and S. Nayar, Describable visual attributes for face verification and image search, IEEE Transactions on Pattern Analysis and Machine Intelligence,vol. 33, no. 10, pp. 1962–1977, 2011.
- M. S. Kirkpatrick, G. Ghinita, and E. Bertino, Privacypreserving enforcement of spatially aware rbac, IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 5, pp. 627–640, 2012.
- F. Magrabi, M.-S. Ong, W. Runciman, and E. Coiera, Using fda reports to inform a classification for health information technology safety problems, Journal of the American Medical Informatics Association, vol. 19, no. 1, pp. 45–53, 2012.
- F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn. ”Information hiding-a survey.” Proceedings of the IEEE, special issue on Protection of Multimedia Content, vol. 87, no.7,pp. 1062-1078, 1999.
- S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer, Kerberos authentication and authorization system, in In Project Athena Technical Plan. Citeseer, 1987
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.