Secure Sharing of PHR Data Using Re-Encryption: SESPHR

V K Monika, V Praveen Kumar Bejagam

Abstract


We propose a technique called SeSPHR for secure sharing of the PHRs in the cloud. The SeSPHR plan guarantees tolerant driven control on the PHRs and jelly the classification of the PHRs. The patients store the scrambled PHRs on the un-confided in cloud servers and specifically award access to various kinds of clients on various segments of the PHRs. A semi-believed intermediary called Setup and Re-encryption Server (SRS) is acquainted with set up people in general/private key sets and to create the re-encryption keys. In addition, the strategy is secure against insider dangers and furthermore implements a forward and in reverse access control. Moreover, we officially examine and confirm the working of SeSPHR strategy through the High Level Petri Nets (HLPN).


References


K. Gai, M. Qiu, Z. Xiong, and M. Liu, “Privacy-preserving multi-channel communication in Edge-of-Things,†Future Generation Computer Systems, 85, 2018, pp. 190-200.

K. Gai, M. Qiu, and X. Sun, “A survey on FinTech,†Journal of Network and Computer Applications, 2017, pp. 1-12.

A. Abbas, K. Bilal, L. Zhang, and S. U. Khan, “A cloud based health insurance plan recommendation system: A user cen-tered approach, “Future Generation Computer Systems, vols. 43-44, pp. 99-109, 2015.

A. N. Khan, ML M. Kiah, S. A. Madani, M. Ali, and S. Sham-shirband, “Incremental proxy re-encryption scheme for mo-bile cloud computing environment,â€The Journal of Supercom-puting,Vol. 68, No. 2, 2014, pp. 624-651.

R. Wu, G.-J. Ahn, and H. Hu, “Secure sharing of electronic health records in clouds,†In 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Work-

A. Abbas andS. U. Khan, “A Review on the State-of-the-Art Privacy Preserving Approaches in E-Health Clouds,†IEEE Journal of Biomedical and Health Informatics,vol. 18, no. 4, pp. 1431-1441, 2014.

M. H. Au, T. H. Yuen, J. K. Liu, W. Susilo, X. Huang, Y. Xiang, and Z. L. Jiang, “A general framework for secure sharing of personal health records in cloud system,†Journal of Comput-er and System Sciences, vol. 90, pp, 46-62, 2017.

J. Li, “Electronic personal health records and the question of privacy,†Computers, 2013, DOI: 10.1109/MC.2013.225.

D. C. Kaelber, A. K. Jha, D. Johnston, B. Middleton, and D. W. Bates, “A research agenda for personal health records (PHRs),†Journal of the American Medical Informatics Association, vol.15, no. 6, 2008, pp. 729-736.

S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scala-ble and fine-grained data access control in cloud computing,†in Proceedings of the IEEE INFOCOM, March 2010, pp. 1-9.

S. Kamara and K. Lauter, “Cryptographic cloud storage,†Financial Cryptography and Data Security, vol. 6054, pp. 136–149, 2010.

T. S. Chen, C. H. Liu, T. L. Chen, C. S. Chen, J. G. Bau, and T.C. Lin, “Secure Dynamic access control scheme of PHR in cloud computing,†Journal of Medical Systems, vol. 36, no. 6, pp. 4005–4020, 2012.

K. Gai, M. Qiu, “Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers,†IEEE Transactions on Industrial Informatics, 2017, DOI: 10.1109/TII.2017.2780885..

M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,†IEEE Transactions on Parallel and Distributed Systems, 2013, vol. 24, no. 1, pp. 131–143.

“Health Insurance Portability and Accountability,†http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/, accessed on October 20, 2014.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â