Dynamic access policy in cloud-based personal health record (PHR) systems
نویسندگان
چکیده
With the development of cloud computing, an increasing number of users are using cloud-based personal health record (PHR) systems. The PHR is closely tied to patient privacy, and thus existing studies suggest encrypting PHRs before outsourcing. Comparison-based encryption (CBE) was the first to implement time comparison in an attribute-based access policy by means of the forward and backward derivation functions. However, CBE cannot be directly applied to cloud-based PHR environments for the following reasons: First, the cost of encryption grows linearly with the number of attributes in the access policy. Second, policy updating incurs high communication and computation costs for the data owner. To efficiently implement a dynamic access policy for PHRs in clouds, we first propose a hierarchical comparisonbased encryption (HCBE) scheme that incorporates an attribute hierarchy into CBE. The HCBE scheme encrypts a ciphertext with a small number of generalized attributes at a higher level rather than many specific attributes at a lower level, greatly improving the encryption performance. Using the HCBE scheme as a foundation, we then develop a dynamic policy updating (DPU) scheme by utilizing the proxy re-encryption (PRE) technique. The DPU scheme can avoid the transmission of ciphertexts and minimize the computation overhead on the data owner by delegating the policy updating operations to the cloud. Extensive experiments have been conducted using Preprint submitted to Information Sciences June 15, 2016 a synthetic data set to verify the efficiency of our proposed schemes.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملEfficient and Secure Sharing of Personal Health Records Using Attribute-Based Encryption in Cloud Computing
Recently, personal health record (PHR) has emerged as a patient-centric model of health information exchange, which features storing PHRs electronically in one centralized place, such as a third-party cloud service provider. Personal Health Record is web based application that allows users to directly enter their information such as diagnosis, medications, laboratory tests, immunizations and ot...
متن کاملIntegrated, reliable and cloud-based personal health record: A scoping review
Personal Health Records (PHR) emerge as an alternative to integrate patient’s health information to give a global view of patients' status. However, integration is not a trivial feature when dealing with a variety electronic health systems from healthcare centers. Access to PHR sensitive information must comply with privacy policies defined by the patient. Architecture PHR design should be in a...
متن کاملFine-grained Access of Personal Health Record in Cloud Computing
Cloud computing is used broadly in various services which maintain Personal Health Record (PHR). It is an emerging Health-centric model of patient health information interchange. Personal Health Record (PHR) information can be stored in a third party server i.e.Cloud server. The most important issues are fine–grained access, cryptographically enforced data access control, scalability in key man...
متن کاملSurvey on Multi Authority Attribute Based Encryption for Personal Health Record in Cloud Computing
Personal Health Record (PHR) service is an emerging model for health information exchange. PHR system allows patients to create, control manage, and share their health information with other users as well as healthcare providers like Google eHealth. A PHR service is likely to be hosted by third-party cloud service providers in order to enhance its interoperability. The access control and privac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Sci.
دوره 379 شماره
صفحات -
تاریخ انتشار 2017