Smart Trends in Computing and Communications pp 199-209 | Cite as
Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE)
Abstract
Healthcare organizations are adopting Electronic Health Record (EHR) for better and fast services. Due to flexibility, security, and efficiency, cloud data storage has become a frequent alternative for deploying EHR systems. Several cryptography techniques provide security to cloud user’s data by encrypting and decrypting data for intended users. The present paper proposes Ciphertext-Policy Identity-based Encryption (CP-IBE) as a cryptographic technique for cloud data. CP-IBE is combination of data encryption and identity-based approach. It is enhanced by integrating CP-IBE algorithm with Elliptic Curve Cryptography (ECC) that gives a novel scheme for public-key cryptography known as Ciphertext-Policy Identity-based Elliptic Curve Cryptography (CP-IBE-ECC). Torsion point concept is used in the Elliptic Curve Cryptography (ECC) system. An elliptic curve is the formation of curve under an algebraic set of coordinates which does not intersect with other points during curve formation. This merit makes us define a new security model in healthcare applications. None of the studies has explored the merits of applying torsion points on key distribution system. It provides dynamic data support, efficiency, security as well as privacy for E-Healthcare System. This system focus on storing and maintaining the Health Records of patients electronically so refer these records as EHR. The EHRs are migrated to the cloud data centers in order to prevent medical errors and to have efficient storage and access to those records. IBE encryption technique is also applied in order to make EHRs more secure. The Shared Nearest Neighbor (SNN) clustering is applied to resolve the issues with attribute clustering. SNN works on estimating the nearest neighbors for the most shared attributes and then clusters the records.
Keywords
Ciphertext-Policy Elliptic Curve Cryptography Identity-based encryption Cloud computing SecurityReferences
- 1.Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. J. Comput. 32(3), 586–615 (2003)MathSciNetCrossRefGoogle Scholar
- 2.Wang, Q., Li, F., Wang, H.: An anonymous multireceiver with online/offline identity-based encryption. In: Hindawi Wireless Communications and Mobile Computing, pp. 1–18 (2018)Google Scholar
- 3.Hu, Z., Liu, S., Liu, J.: Revocable identity-based encryption and server-aided revocable IBE from the computational Diffie-Hellman assumption. Cryptogr. MDPI 2, 1–18 (2018)CrossRefGoogle Scholar
- 4.Ding, S., Li, C., Li, H.: A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. Special Section on Security and Trusted Computing for Industrial, IEEE Access 6, 27336–27345 (2018)CrossRefGoogle Scholar
- 5.Clark, P.L., Cook, B., Stankewic, J.: Torsion Points on Elliptic Curves with Complex Multiplication (2013)Google Scholar
- 6.Lee-Post, A., Pakath, R.: Cloud Computing: A Comprehensive Introduction. Information Science Reference (an imprint of IGI Global), pp. 1–23 (2014)Google Scholar
- 7.Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2015)MathSciNetCrossRefGoogle Scholar
- 8.Wang, J., Chen, X.: Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64, 3293–3303 (2015)MathSciNetCrossRefGoogle Scholar
- 9.Ni, J., Li, G., et. al.: Adaptive database schema design for multi-tenant data management. IEEE Trans. Knowl. Data Eng. 26(9), 2079–2093 (2013)CrossRefGoogle Scholar
- 10.Licenciado, Doutor João Carlos Gomes Moura Pires.: Implementation for Spatial Data of the Shared Nearest Neighbour with Metric, pp. 1–71 (2012)Google Scholar
- 11.Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: ICALP Part II, LNCS, vol. 5126, pp. 579–591. Springer, Berlin, Heidelberg (2008)Google Scholar
- 12.Li, Q., Zhu, H., Ying, Z., Zhang, T.: Traceable ciphertext-policy attribute-based encryption with verifiable outsourced decryption in eHealth cloud. Hindawi Wirel. Commun. Mob. Comput. 2018(2018), 1–12 (2018)Google Scholar
- 13.Abdullah, K.E., Ali, N.H.M.: Security improvement in elliptic curve cryptography. Int. J. Adv. Comput. Sci. Appl. 9(5), 122–131 (2018)Google Scholar
- 14.Ma, X., Wang, X., Lin, D.: Anonymous Identity-Based Encryption with. In: ACISP, pp. 1–10 (2018)Google Scholar
- 15.Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 110–122 (2007)Google Scholar
- 16.Dharmadhikari, D., Tamne, S.: Public Auditing Schemes (PAS) for Dynamic Data in Cloud: A Review. In: SmartCom 2017, CCIS 876, pp. 186–191. Springer (2018)Google Scholar
- 17.Naveen Bail, B., Mary Sowjana, A.: An incremental shared nearest neighbour clustering approach for numerical data using an efficient distance measure, Vishakhapatnam. Int. J. Adv. Trends Comput. Sci. Eng. 4(9), pp. 14192–14196 (2015)Google Scholar