About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Intelligent Systems and Machine Learning. First EAI International Conference, ICISML 2022, Hyderabad, India, December 16-17, 2022, Proceedings, Part I

Research Article

Securing Outsourced Personal Health Records on Cloud Using Encryption Techniques

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-35078-8_17,
        author={Abhijeet Borade and Rashmi Agarwal},
        title={Securing Outsourced Personal Health Records on Cloud Using Encryption Techniques},
        proceedings={Intelligent Systems and Machine Learning. First EAI International Conference, ICISML 2022, Hyderabad, India, December 16-17, 2022, Proceedings, Part I},
        proceedings_a={ICISML},
        year={2023},
        month={7},
        keywords={PHRs Access control CP-ABE Policy update Proxy re-encryption Policy versioning Performance evaluation},
        doi={10.1007/978-3-031-35078-8_17}
    }
    
  • Abhijeet Borade
    Rashmi Agarwal
    Year: 2023
    Securing Outsourced Personal Health Records on Cloud Using Encryption Techniques
    ICISML
    Springer
    DOI: 10.1007/978-3-031-35078-8_17
Abhijeet Borade1,*, Rashmi Agarwal1
  • 1: REVA Academy for Corporate Excellence
*Contact email: abhijeet.cs02@reva.edu.in

Abstract

Due to the greater flexibility and accessibility of data outsourcing environments such as cloud computing environments, several healthcare organizations have implemented electronic Personal Health Records (PHRs) to ensure that individual patients have such resilience and scalability. It allows users to manage their health information in a safe environment. However, PHRs contain highly sensitive information where security and privacy issues are major concerns. PHR owners should also be able to securely define their own access policies for offsite data. In addition to basic authentication capabilities, existing commercial cloud platforms typically offer symmetric or public key encryption as an optional feature to keep tenants’ data confidential. However, such traditional encryption schemes are not suitable for data outsourcing environments due to the high key management overhead of symmetric encryption and the high maintenance costs of handling multiple copies of ciphertext for public key encryption solutions.

The output of this study is to design and development of a secure, fine-grained access control scheme with lightweight updates to outsourced PHR access policies. The proposed scheme is based on Cipher Text Policy Attribute-Based Encryption (CP-ABE) and Proxy Re-Encryption (PRE). Additionally, this study introduces a policy versioning technique that supports full traceability of policy changes using the Elgamal technique and a performance evaluation that demonstrates the efficiency of the proposed scheme.

Keywords
PHRs Access control CP-ABE Policy update Proxy re-encryption Policy versioning Performance evaluation
Published
2023-07-10
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-35078-8_17
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL