Dual Locks: Partial Sharing of Health Documents in Cloud

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8456)

Abstract

While working with the sensitive data e.g., related to health, there is a barrier of mistrust while selecting cloud services. To overcome this barrier various standards of cryptosystem are used like encrypted outsourcing, attribute based encryption and oblivious access policies. The default access model of authorization on encrypted data gives full access permission to its user. To narrow down the access scope as a subset on given authorization is a non-trivial task. To design such systems multiple encryption and decryption keys, data partitioning or attribute based encryption are few available options. These techniques involve extra computation cost and complex issue of key management. In this paper we have proposed a framework to restrict authorization on encrypted data with selective access. The underlying model is independent from complex issue of key management. The proposed model also avoids one dimension of side channel attacks on secure data and that is to learn from the patterns of encrypted traffic. Our experimental results show that selective authorization based on proposed model is compute efficient and create random pattern for user access even for similar queries.

Keywords

Health data Data sharing Cloud computing Security and privacy 

Notes

Acknowledgment

This research was supported by the MSIP(Ministry of Science, ICT&Future Planning), Korea, under the ITRC(Information Technology Research Center) support program supervised by the NIPA(National IT Industry Promotion Agency) (NIPA-2014-(H0301-14-1003)).

References

  1. 1.
    Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205–222. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, pp. 647–651. IEEE (2012)Google Scholar
  3. 3.
    Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 85–90. ACM (2009)Google Scholar
  4. 4.
    Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM (2006)Google Scholar
  5. 5.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)Google Scholar
  6. 6.
    Ibraimi, L., Asim, M., Petkovic, M.: Secure management of personal health records by applying attribute-based encryption. In: 2009 6th International Workshop on Wearable Micro and Nano Technologies for Personalized Health (pHealth), pp. 71–74. IEEE (2009)Google Scholar
  7. 7.
    Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  8. 8.
    Li, M., Shucheng, Y.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)CrossRefGoogle Scholar
  9. 9.
    Löhr, H., Sadeghi, A.-R., Winandy, M.: Securing the e-health cloud. In: Proceedings of the 1st ACM International Health Informatics Symposium, pp. 220–229. ACM (2010)Google Scholar
  10. 10.
    Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)CrossRefGoogle Scholar
  11. 11.
    Pisani, E., AbouZahr, C.: Sharing health data: good intentions are not enough. Bull. World Health Organ. 88(6), 462–466 (2010)CrossRefGoogle Scholar
  12. 12.
    Steinbrook, R.: Personally controlled online health data-the next big thing in medical care? N. Engl. J. Med. 358(16), 1653 (2008)CrossRefGoogle Scholar
  13. 13.
    Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)CrossRefMATHMathSciNetGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Computer EngineeringKyung Hee UniversitySeoulSouth Korea
  2. 2.School of ComputingUniversity of the West of ScotlandPaisleyUK

Personalised recommendations