Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Authors

  • Maede Ashouri-Talouki Department of Information Technology Engineering, Faculty of Computer Engineering, University of Isfahan
  • Maryam Zarezadeh Department of Information Technology Engineering, University of Isfahan, Isfahan, Iran
  • Mohammad Siavashi 2Department of Computer Science and Engineering, Shiraz University, Shiraz, Iran
Abstract:

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records in a cloud system. In their scheme, encrypted EHRs are stored in multiple clouds to provide scalability and privacy. In addition, they considered a role-based access control (RBAC) such that for any user, an EHR access policy must be determined. They also encrypt the EHRs by the public keys of all users. So, for a large amount of EHRs, this scheme is not efficient. Furthermore, using RBAC for access policy makes the policy changing difficult. In their scheme, users cannot search on encrypted EHRs based on diseases and some physicians must participate in the data retrieval by a requester physician. In this paper, we address these problems by considering a ciphertext-policy attribute-based encryption (CP-ABE) which is conceptually closer to the traditional access control methods such as RBAC. Our secure scheme can retrieve encrypted EHR based on a specific disease. Furthermore, the proposed scheme guarantees the user access control and the anonymity of the user or data owner during data retrieval. Moreover, our scheme is resistant against collusion between unauthorized retrievers to access the data. The analysis shows that our scheme is secure and efficient for cloud-based EHRs.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Electronic Health Record (EHR) and Cloud Security: The Current Issues

Received Aug 15 th , 2013 Revised Oct 20 th , 2013 Accepted Nov 30 th , 2013 With the advent of the cloud computing and its associated challenges, building a secured electronic health record (EHR) in a cloud computing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing concept is becoming a popular information technology (IT) infrastr...

full text

Authorisation and access control for electronic health record systems

Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture sho...

full text

k-Times Attribute-Based Anonymous Access Control for Cloud Computing

In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In additi...

full text

Leveraging the cloud for electronic health record access.

Healthcare providers are under increasing pressure to enable widespread access to their electronic health record (EHR) systems for the patients they serve; the meaningful use incentive programs are perhaps the most significant driver encouraging this access. Elsewhere, the cloud has become extremely efficient and successful at establishing digital identities for individuals and making them inte...

full text

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

full text

Attribute-Based Access Control Scheme for Security of Cloud Storage Systems Using RNS Cryptography

Emerging features of the cloud storage services enables data owners to store their big data in the cloud and provide the data access to the users. As privacy and security of the cloud server is not ensured, an Attribute-Based Encryption (ABE) a promising technique for data access control in cloud storage is utilized in this project. Attribute-based encryption, especially for cipher text-policy ...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 12  issue 2

pages  117- 128

publication date 2020-07-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023