Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE)

  • Dipa D. DharamadhikariEmail author
  • Sharvari C. Tamane
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 165)


Healthcare organizations are adopting Electronic Health Record (EHR) for better and fast services. Due to flexibility, security, and efficiency, cloud data storage has become a frequent alternative for deploying EHR systems. Several cryptography techniques provide security to cloud user’s data by encrypting and decrypting data for intended users. The present paper proposes Ciphertext-Policy Identity-based Encryption (CP-IBE) as a cryptographic technique for cloud data. CP-IBE is combination of data encryption and identity-based approach. It is enhanced by integrating CP-IBE algorithm with Elliptic Curve Cryptography (ECC) that gives a novel scheme for public-key cryptography known as Ciphertext-Policy Identity-based Elliptic Curve Cryptography (CP-IBE-ECC). Torsion point concept is used in the Elliptic Curve Cryptography (ECC) system. An elliptic curve is the formation of curve under an algebraic set of coordinates which does not intersect with other points during curve formation. This merit makes us define a new security model in healthcare applications. None of the studies has explored the merits of applying torsion points on key distribution system. It provides dynamic data support, efficiency, security as well as privacy for E-Healthcare System. This system focus on storing and maintaining the Health Records of patients electronically so refer these records as EHR. The EHRs are migrated to the cloud data centers in order to prevent medical errors and to have efficient storage and access to those records. IBE encryption technique is also applied in order to make EHRs more secure. The Shared Nearest Neighbor (SNN) clustering is applied to resolve the issues with attribute clustering. SNN works on estimating the nearest neighbors for the most shared attributes and then clusters the records.


Ciphertext-Policy Elliptic Curve Cryptography Identity-based encryption Cloud computing Security 


  1. 1.
    Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. J. Comput. 32(3), 586–615 (2003)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Wang, Q., Li, F., Wang, H.: An anonymous multireceiver with online/offline identity-based encryption. In: Hindawi Wireless Communications and Mobile Computing, pp. 1–18 (2018)Google Scholar
  3. 3.
    Hu, Z., Liu, S., Liu, J.: Revocable identity-based encryption and server-aided revocable IBE from the computational Diffie-Hellman assumption. Cryptogr. MDPI 2, 1–18 (2018)CrossRefGoogle Scholar
  4. 4.
    Ding, S., Li, C., Li, H.: A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. Special Section on Security and Trusted Computing for Industrial, IEEE Access 6, 27336–27345 (2018)CrossRefGoogle Scholar
  5. 5.
    Clark, P.L., Cook, B., Stankewic, J.: Torsion Points on Elliptic Curves with Complex Multiplication (2013)Google Scholar
  6. 6.
    Lee-Post, A., Pakath, R.: Cloud Computing: A Comprehensive Introduction. Information Science Reference (an imprint of IGI Global), pp. 1–23 (2014)Google Scholar
  7. 7.
    Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2015)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Wang, J., Chen, X.: Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64, 3293–3303 (2015)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Ni, J., Li, G., et. al.: Adaptive database schema design for multi-tenant data management. IEEE Trans. Knowl. Data Eng. 26(9), 2079–2093 (2013)CrossRefGoogle Scholar
  10. 10.
    Licenciado, Doutor João Carlos Gomes Moura Pires.: Implementation for Spatial Data of the Shared Nearest Neighbour with Metric, pp. 1–71 (2012)Google Scholar
  11. 11.
    Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: ICALP Part II, LNCS, vol. 5126, pp. 579–591. Springer, Berlin, Heidelberg (2008)Google Scholar
  12. 12.
    Li, Q., Zhu, H., Ying, Z., Zhang, T.: Traceable ciphertext-policy attribute-based encryption with verifiable outsourced decryption in eHealth cloud. Hindawi Wirel. Commun. Mob. Comput. 2018(2018), 1–12 (2018)Google Scholar
  13. 13.
    Abdullah, K.E., Ali, N.H.M.: Security improvement in elliptic curve cryptography. Int. J. Adv. Comput. Sci. Appl. 9(5), 122–131 (2018)Google Scholar
  14. 14.
    Ma, X., Wang, X., Lin, D.: Anonymous Identity-Based Encryption with. In: ACISP, pp. 1–10 (2018)Google Scholar
  15. 15.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 110–122 (2007)Google Scholar
  16. 16.
    Dharmadhikari, D., Tamne, S.: Public Auditing Schemes (PAS) for Dynamic Data in Cloud: A Review. In: SmartCom 2017, CCIS 876, pp. 186–191. Springer (2018)Google Scholar
  17. 17.
    Naveen Bail, B., Mary Sowjana, A.: An incremental shared nearest neighbour clustering approach for numerical data using an efficient distance measure, Vishakhapatnam. Int. J. Adv. Trends Comput. Sci. Eng. 4(9), pp. 14192–14196 (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringMarathwada Institute of TechnologyAurangabadIndia
  2. 2.Department of Information TechnologyJawaharlal Nehru Engineering CollegeAurangabadIndia

Personalised recommendations