Journal of Medical Systems

, 37:9992 | Cite as

Privacy Preserving Index for Encrypted Electronic Medical Records

  • Yu-Chi Chen
  • Gwoboa Horng
  • Yi-Jheng Lin
  • Kuo-Chang Chen
Original Paper

Abstract

With the development of electronic systems, privacy has become an important security issue in real-life. In medical systems, privacy of patients’ electronic medical records (EMRs) must be fully protected. However, to combine the efficiency and privacy, privacy preserving index is introduced to preserve the privacy, where the EMR can be efficiently accessed by this patient or specific doctor. In the literature, Goh first proposed a secure index scheme with keyword search over encrypted data based on a well-known primitive, Bloom filter. In this paper, we propose a new privacy preserving index scheme, called position index (P-index), with keyword search over the encrypted data. The proposed index scheme is semantically secure against the adaptive chosen keyword attack, and it also provides flexible space, lower false positive rate, and search privacy. Moreover, it does not rely on pairing, a complicate computation, and thus can search over encrypted electronic medical records from the cloud server efficiently.

Keywords

Privacy preserving index Electronic medical record Keyword search Privacy Security 

References

  1. 1.
    Fan, C. I., Huang, S. Y., Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Futur. Gener. Comput. Syst. 2012 (in Press). doi:10.1016/j.future.2012.05.005.
  2. 2.
    Kaufman, L. M., Data security in the world of cloud computing. IEEE Secur. Priv. 7:61–64, 2009.Google Scholar
  3. 3.
    Subashini, S., Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34:1–11, 2011.Google Scholar
  4. 4.
    Wang, Q., Wang, C., Ren, K., Lou, W., Li, J., Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22:847–859, 2011.CrossRefGoogle Scholar
  5. 5.
    Byun, J., and Lee, D., On a security model of conjunctive keyword search over encrypted relational database. J. Syst. Softw. 84:1364–1372, 2011.CrossRefGoogle Scholar
  6. 6.
    Byun, J., Lee, D., Lim, J., Efficient conjunctive keyword search on encrypted data storage system. In: Proceedings of EuroPKI 2006, LNCS. Vol. 4043. pp. 184–196, 2006.Google Scholar
  7. 7.
    Golle, P., Staddon, J., Waters, B., Secure conjunctive keyword search over encrypted data. In: Proceedings of Applied Cryptography and Network Security Conference, LNCS. Vol. 3089, pp. 31–45, 2004.Google Scholar
  8. 8.
    Jeong, I. R., and Kwon, J. O., Analysis of some keyword search schemes in encrypted data. IEEE Commun. Lett. 12:213–215, 2008.CrossRefGoogle Scholar
  9. 9.
    Song, D., Wagner, D., Perrig, A., Practical techniques for searches on encrypted data. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, pp. 44–55, 2000.Google Scholar
  10. 10.
    Abdalla, M. et al., Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J. Cryptol. 21:350–391, 2008.MathSciNetCrossRefMATHGoogle Scholar
  11. 11.
    Baek, J., Safavi-Naini, R., Susilo, W., A Public key encryption with keyword search revisited. In: Proceedings of ICCSA 2008, LNCS. Vol. 5072. pp. 1249–1259, 2008.Google Scholar
  12. 12.
    Boneh, D., Crescenzo, G. D., Ostrovsky, R., Persiano, G., Public key encryption with keyword search. In: Proceedings of EUROCRYPTO’04, LNCS. Vol. 3027. pp. 506–552, 2004.Google Scholar
  13. 13.
    Park, D. J., Kim, K., Lee, P. J., Public key encryption with conjunctive field keyword search. In: Proceedings of Information Security Applications 2004, LNCS. Vol. 3325. pp. 73–86, 2004.Google Scholar
  14. 14.
    Rhee, H. S., Park, J. H., Susilo, W., Lee, D. H., Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83:763–771, 2010.CrossRefGoogle Scholar
  15. 15.
    Zhang, B., and Zhang, F., An efficient public key encryption with conjunctive-subset keywords search. J. Netw. Comput. Appl. 34:262–267, 2011.CrossRefGoogle Scholar
  16. 16.
    Bellare, M., Boldyreva, A., O’Neill, A., Deterministic and efficiently searchable encryption. In: Proceedings of CRYPTO’07, LNCS. Vol. 4622. pp. 535–552, 2007.Google Scholar
  17. 17.
    Brinkman, R., Schoenmakers, B., Doumen, J. M., Jonker, W., Experiments with queries over encrypted data using secret sharing. In: Proceedings of Secure Data Management, LNCS. Vol. 3674. pp. 33-46, 2005.Google Scholar
  18. 18.
    Goh, E. J., Secure Indexes. The Cryptology ePrint Archive, Report 2003/216. 2004. http://eprint.iacr.org/2003/216.pdf.
  19. 19.
    Archer, N., and Cocosila, M., A comparison of physician pre-adoption and adoption views on electronic health records in Canadian medical practices. J. Med. Internet Res. 13:3, 2011.CrossRefGoogle Scholar
  20. 20.
    Gunter, T. D., and Nicolas, T. P., The emergence of national electronic health record architectures in the United States and Australia: Models, costs, and questions. J. Med. Internet Res. 7:1, 2005.CrossRefGoogle Scholar
  21. 21.
    Garcia-Smith, D., and Effken, J. A., Development and initial evaluation of the clinical information systems success model (CISSM). Int. J. Med. Inform. 82:539–552, 2013.CrossRefGoogle Scholar
  22. 22.
    Li, J. S., Zhang, X. G., Chu, J., Suzuki, M., Araki, K., Design and development of EMR supporting medical process management. J. Med. Syst. 36:1193–1203, 2012.CrossRefGoogle Scholar
  23. 23.
    Benaloh, J., Chase, M., Horvitz, E., Lauter, K., Patient controlled encryption: ensuring privacy of electronic medical records, Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW ’09). pp. 103–114, 2009.Google Scholar
  24. 24.
    Bloom, B. H., Space/Time trade-offs in hash coding with allowable errors. Commun. ACM 13:422–426, 1970.CrossRefMATHGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Yu-Chi Chen
    • 1
  • Gwoboa Horng
    • 1
  • Yi-Jheng Lin
    • 1
  • Kuo-Chang Chen
    • 1
  1. 1.Department of Computer Science and EngineeringNational Chung Hsing UniversityTaichungTaiwan

Personalised recommendations