Autosoft Journal

Online Manuscript Access


Secure Access Control of E-Health System with Attribute-Based Encryption



Abstract

Cloud computing is a new paradigm, which provides low-cost and effective outsourced data storage service. People are used to storing personal data in cloud server. E-Health system (EHS) privacy should be protected, because it is national security for citizen privacy. Personal Health Record (PHR) is the core of EHS that should be protected. Thus, how to efficiently store, access and share these data is critical. Attribute-based encryption (ABE) is a new public key encryption based on users2019 attributes. In this paper, we present a new method to realize a secure fine-grained access control to PHRs, which is based on emerging ABE primitives. In more details, PHR owners divide the PHR data in terms of the privacy levels. A key-policy ABE (KP-ABE) is utilized to provide a fine-grained access control storage system for outsourced sensitive data. It can also provide efficient user revocation by using the timestamp in the private key. Security analysis shows that our construction achieves the data confidentiality. That is, any unauthorized user is not allowed to access the data outsourced in the cloud.


Keywords


Pages

Total Pages: 8
Pages: 345-352

DOI
10.1080/10798587.2015.1132586


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 22
Issue: 3
Year: 2016

Cite this document


References

"International Journal of Distance Education Technologies." n. pag. Crossref. Web. https://doi.org/10.4018/IJDET

Bethencourt, John, Amit Sahai, and Brent Waters. "Ciphertext-Policy Attribute-Based Encryption." 2007 IEEE Symposium on Security and Privacy (SP ”07) (2007): n. pag. Crossref. Web. https://doi.org/10.1109/SP.2007.11

Boldyreva, Alexandra, Vipul Goyal, and Virendra Kumar. "Identity-Based Encryption with Efficient Revocation." Proceedings of the 15th ACM conference on Computer and communications security - CCS ”08 (2008): n. pag. Crossref. Web. https://doi.org/10.1145/1455770.1455823

Brent W. the 14th International Conference on Practice and Theory in Public Key Cryptography

Chase, Melissa. "Multi-Authority Attribute Based Encryption." Lecture Notes in Computer Science 515-534. Crossref. Web. https://doi.org/10.1007/978-3-540-70936-7_28

Chen, Tzer-Shyong et al. "Secure Dynamic Access Control Scheme of PHR in Cloud Computing." Journal of Medical Systems 36.6 (2012): 4005-4020. Crossref. Web. https://doi.org/10.1007/s10916-012-9873-8

"Proceedings of the 14th ACM Conference on Computer and Communications Security - CCS ”07." (2007): n. pag. Crossref. Web. https://doi.org/10.1145/1315245

Clementine G. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications

Bao, Feng, Hui Li, and Guilin Wang, eds. "Information Security Practice and Experience." Lecture Notes in Computer Science (2009): n. pag. Crossref. Web. https://doi.org/10.1007/978-3-642-00843-6

Goyal V. ACM conference on Computer and Communications Security

Green M. SEC’11: Proceedings of the 20th USENLX conference on Security

Junzuo Lai et al. "Attribute-Based Encryption With Verifiable Outsourced Decryption." IEEE Transactions on Information Forensics and Security 8.8 (2013): 1343-1354. Crossref. Web. https://doi.org/10.1109/TIFS.2013.2271848

Lewis N. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications

Jajodia, Sushil, and Jianying Zhou, eds. "Security and Privacy in Communication Networks." Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (2010): n. pag. Crossref. Web. https://doi.org/10.1007/978-3-642-16161-2

Muller S. Information Security and Cryptology

Ostrovsky R. the 14th ACM Conference on Computer and Communications Security

Pirretti M. Proceedings of the 13th ACM Conference on Computer and Communications Security

"International Journal of Cloud Applications and Computing." n. pag. Crossref. Web. https://doi.org/10.4018/IJCAC

Sahai A. EUROCRYPT, LNCS3494

Tang, P. C. et al. "Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption." Journal of the American Medical Informatics Association 13.2 (2006): 121-126. Crossref. Web. https://doi.org/10.1197/jamia.M2025

Wang, Changji, Xuan Liu, and Wentao Li. "Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption." 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems (2012): n. pag. Crossref. Web. https://doi.org/10.1109/iNCoS.2012.65

Wang J.F. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications

Yu, Shucheng et al. "Attribute Based Data Sharing with Attribute Revocation." Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS ”10 (2010): n. pag. Crossref. Web. https://doi.org/10.1145/1755688.1755720

Zheng Q.J. CRYPTO, LNCS2139

Zhou Z. 8th International Conference on Network and Service Management (CNSM)

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present

SCImago Journal & Country Rank


CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/