ICOST 2014: Smart Homes and Health Telematics pp 187-194 | Cite as
Dual Locks: Partial Sharing of Health Documents in Cloud
Abstract
While working with the sensitive data e.g., related to health, there is a barrier of mistrust while selecting cloud services. To overcome this barrier various standards of cryptosystem are used like encrypted outsourcing, attribute based encryption and oblivious access policies. The default access model of authorization on encrypted data gives full access permission to its user. To narrow down the access scope as a subset on given authorization is a non-trivial task. To design such systems multiple encryption and decryption keys, data partitioning or attribute based encryption are few available options. These techniques involve extra computation cost and complex issue of key management. In this paper we have proposed a framework to restrict authorization on encrypted data with selective access. The underlying model is independent from complex issue of key management. The proposed model also avoids one dimension of side channel attacks on secure data and that is to learn from the patterns of encrypted traffic. Our experimental results show that selective authorization based on proposed model is compute efficient and create random pattern for user access even for similar queries.
Keywords
Health data Data sharing Cloud computing Security and privacyNotes
Acknowledgment
This research was supported by the MSIP(Ministry of Science, ICT&Future Planning), Korea, under the ITRC(Information Technology Research Center) support program supervised by the NIPA(National IT Industry Promotion Agency) (NIPA-2014-(H0301-14-1003)).
References
- 1.Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205–222. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 2.Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, pp. 647–651. IEEE (2012)Google Scholar
- 3.Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 85–90. ACM (2009)Google Scholar
- 4.Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM (2006)Google Scholar
- 5.Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)Google Scholar
- 6.Ibraimi, L., Asim, M., Petkovic, M.: Secure management of personal health records by applying attribute-based encryption. In: 2009 6th International Workshop on Wearable Micro and Nano Technologies for Personalized Health (pHealth), pp. 71–74. IEEE (2009)Google Scholar
- 7.Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 8.Li, M., Shucheng, Y.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)CrossRefGoogle Scholar
- 9.Löhr, H., Sadeghi, A.-R., Winandy, M.: Securing the e-health cloud. In: Proceedings of the 1st ACM International Health Informatics Symposium, pp. 220–229. ACM (2010)Google Scholar
- 10.Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)CrossRefGoogle Scholar
- 11.Pisani, E., AbouZahr, C.: Sharing health data: good intentions are not enough. Bull. World Health Organ. 88(6), 462–466 (2010)CrossRefGoogle Scholar
- 12.Steinbrook, R.: Personally controlled online health data-the next big thing in medical care? N. Engl. J. Med. 358(16), 1653 (2008)CrossRefGoogle Scholar
- 13.Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)CrossRefMATHMathSciNetGoogle Scholar