CFP last date
20 January 2025
Reseach Article

A Homomorphic Encryption Technique for Scalable and Secure Sharing of Personal Health Record in Cloud Computing

by Soubhagya B, Venifa Mini G, Jeya A. Celin J
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 11
Year of Publication: 2013
Authors: Soubhagya B, Venifa Mini G, Jeya A. Celin J
10.5120/11443-7344

Soubhagya B, Venifa Mini G, Jeya A. Celin J . A Homomorphic Encryption Technique for Scalable and Secure Sharing of Personal Health Record in Cloud Computing. International Journal of Computer Applications. 67, 11 ( April 2013), 40-44. DOI=10.5120/11443-7344

@article{ 10.5120/11443-7344,
author = { Soubhagya B, Venifa Mini G, Jeya A. Celin J },
title = { A Homomorphic Encryption Technique for Scalable and Secure Sharing of Personal Health Record in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 11 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 40-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number11/11443-7344/ },
doi = { 10.5120/11443-7344 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:24:25.968811+05:30
%A Soubhagya B
%A Venifa Mini G
%A Jeya A. Celin J
%T A Homomorphic Encryption Technique for Scalable and Secure Sharing of Personal Health Record in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 11
%P 40-44
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computers with internet access. Personal Health Record(PHR) is an emerging patient centric model of health information exchange, which is outsourced to be stored at a third party, such as cloud providers. Issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation have remained the most important challenges towards fine-grained, cryptographically enforced data access control. In the proposed work, a novel patient centric framework and a mechanism for data access control to PHRs stored in semi structured servers. A high degree of patient privacy is ensured by exploiting Homomorphic Encryption technique. It also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break glass access under emergency scenarios without revealing the content of original data. For secure data outsourcing, the users are divided in the PHR system into multiple security domains that greatly reduces the key management for owners and users.

References
  1. "At Risk of Exposure-in the push for electronic medical records, concern is growing about how well privacy can be safeguarded," 2006. [Online]. Available:http://articles. latimes. com/2006/jun/26/health/he-privacy26
  2. "The health insurance portability and accountability act. " [Online]Available: http://www. cms. hhs. gov/HIPAAGenInfo/01_Overview. asp.
  3. H. L¨ohr, A. -R. Sadeghi, and M. Winandy, "Securing the e-health cloud," in Proceedings of the 1st ACM International Health Informatics Symposium, ser. IHI '10, pp. 220–229, 2010.
  4. J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient controlled encryption: ensuring privacy of electronic medical records," in CCSW '09, pp. 103–114, 2009.
  5. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in IEEE INFOCOM'10, 2010.
  6. S. Vidya, K. Vani and D. Kavin Priya, " Secured Personal Health Records Transactions Using Homomorphic Encryption In Cloud Computing," International Journal of Engineering Research & Technology (IJERT), Vol. 1 Issue 10, December- 2012.
  7. Ming Li, Shucheng Yu, Yao Zheng, , Kui Ren, Wenjing Lou, "Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption"IEEE Transactions on Parallel and Distributed Systems,2012.
  8. C. Wang et al. ,"Ensuring Data Storage Security in Cloud Computing," Proc. IWQoS „09, pp. 1–9, July 2009.
  9. M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted personal health records in cloud computing," in ICDCS '11, Jun. 2011.
  10. S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in ASIACCS'10, 2010.
  11. X. Liang, R. Lu, X. Lin, and X. S. Shen, "Ciphertext policy attribute based encryption with efficient revocation," Technical Report, University of Waterloo, 2010.
  12. L. Ibraimi, M. Asim, and M. Petkovic, "Secure management of personal health records by applying attribute-based encryption," Technical Report, University of Twente, 2009.
  13. M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings," in SecureComm'10, pp. 89–106, Sept. 2010.
  14. Aderemi A. Atayero, Oluwaseyi Feyisetan, "Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption," Journal of Emerging Trends in Computing and Information Sciences, VOL. 2, NO. 10, October 2011.
  15. Michael N, Kristin Lauter, Vinod Vaikuntanathan, "Can Homomorphic Encryption be Practical?" Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11
  16. "Indivo. " [Online]. Available: http://indivohealth. org/
  17. Q. Wang et al. ,"Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proc. ESORICS , pp. 355–70, Sept. 2009.
  18. MD. Nurul Huda, Noboru Sonehara, Shigeki Yamada. ,"A Privacy Managemaent Architecture For Patient-Controlled Personal Health Record System," Journal of Engineering Science and Technology Vol. 4, No. 2 , 154 – 170,2009.
  19. Zhiguo Wan, Jun?e Liu, and Robert H. Deng, "HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing", IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, Pp. 743-754, April 2012.
  20. X. Liang, R. Lu, X. Lin, and X. S. Shen, "Patient self-controllable access policy on phi in ehealthcare systems," in AHIC 2010, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Personal Health Record (PHR) Cloud Computing Homomorphic Encryption (HE)