An Efficient Framework for Health System Based on Hybrid Cloud with ABE-Outsourced Decryption

  • B. Balamurugan
  • P. Venkata Krishna
  • N. Saravana Kumar
  • G. V. Rajyalakshmi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 325)

Abstract

Cloud computing is the emerging paradigm that allows the user to access the data using Internet [1]. Growing medical records and difficult data management intends to health department to move toward cloud. The security and privacy are major issues in cloud. The mission-critical applications are limited in cloud though it has numerous small- and medium-sized business applications. We proposed the hybrid cloud-based framework for overall healthcare system with attribute-based encryption with verifiable outsourced decryption for efficient data access and integration of hospitals using community cloud. Secure data transfer and integration of hospital are made possible using hybrid cloud. Our framework overcomes security flaws by achieving data integrity and data confidentiality with secure authentication and authorization. Thus, cloud provides scalable, efficient data access with cost-effective approach.

Keywords

Cloud computing Hybrid cloud Framework cloud health ABE Security privacy 

References

  1. 1.
    S. Sundareswaran, A.C. Squicciarini, D. Lin, Ensuring distributed accountability for data sharing in the cloud. IEEE Trans. Dependable Secure Comput. 9(4), 556, 568 (2012)Google Scholar
  2. 2.
    C. Modi, D. Patel, B. Borisaniya, A. Patel, M. Rajarajan, A survey on security issues and solutions at different layers of cloud computing. J. Supercomput. 63(2), 561–592 (2013)CrossRefGoogle Scholar
  3. 3.
    M.A. Alzain, E. Pardede, B. Soh, J.A. Thom, Cloud computing security. From single to multi-clouds. HICSS, 5490–5499 (2012)Google Scholar
  4. 4.
    G. Kulkarni, J. Gambhir, T. Patil, A. Dongare, A security aspects in cloud computing, in 2012 IEEE 3rd International Conference on Software Engineering and Service Science (ICSESS), 2012, pp. 547, 550Google Scholar
  5. 5.
    X. Huang, Y. Xiang, A. Chonka, J. Zhou, R.H. Deng, A generic framework for three-factor authentication. Preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390, 1397 (2011)Google Scholar
  6. 6.
    K. Kalaiselvan, P. Venkata Krishna, Performance based QoS for cloud’s infrastructure as a service. Int. J. Cloud Comput. 2(4), 325–339 (2013)Google Scholar
  7. 7.
    M. Dimitrova, S. Lozanova, L. Lahtchev, C. Roumenin, A framework for design of cloud compatible medical interfaces. CompSysTech 195–200 (2012)Google Scholar
  8. 8.
    X. Liu, X. Qiu, X. Xie, B. Chen, K. Huang, Implement of a light-weight integrated virtualized environment manager for private cloud computing, in 2012 International Conference on Computer Science and Service System (CSSS), 2012, pp. 523, 526Google Scholar
  9. 9.
  10. 10.
    L. Freitas, P. Watson, Formalising workflows partitioning over federated clouds: multi-level security and costs, in 2012 IEEE Eighth World Congress on Services (SERVICES), 2012, pp. 219, 226Google Scholar
  11. 11.
    C. He, X. Fan, Y. Li, Toward ubiquitous healthcare services with a novel efficient cloud platform. IEEE Trans. Biomed. Eng. 60(1), 230, 234 (2013)Google Scholar
  12. 12.
    M. Li, S. Yu, Y. Zheng, K. Ren, W. Lou, Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131,143 (2013)Google Scholar
  13. 13.
    J. Vidhyalakshmi, J. Prassanna, Providing a trustable healthcare cloud using an enhanced accountability framework, in Proceedings of the International Conference on Computer Science and Information Technology (2013)Google Scholar
  14. 14.
    L. Chen, D.B. Hoang, Novel data protection model in healthcare cloud, in 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), 2011, pp. 550, 555Google Scholar
  15. 15.
    L.Chen, Using algebraic signatures to check data possession in cloud storage. Future Gener. Comp. Syst. 29(7) (2013)Google Scholar
  16. 16.
    R. Zhang, L. Liu, Security models and requirements for healthcare application clouds, in 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), 2010, pp. 268, 275Google Scholar
  17. 17.
  18. 18.

Copyright information

© Springer India 2015

Authors and Affiliations

  • B. Balamurugan
    • 1
  • P. Venkata Krishna
    • 1
  • N. Saravana Kumar
    • 1
  • G. V. Rajyalakshmi
    • 1
  1. 1.VIT UniversityIndiaVellore

Personalised recommendations