Skip to main content

Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE)

  • Conference paper
  • First Online:
Book cover Smart Trends in Computing and Communications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 165))

Abstract

Healthcare organizations are adopting Electronic Health Record (EHR) for better and fast services. Due to flexibility, security, and efficiency, cloud data storage has become a frequent alternative for deploying EHR systems. Several cryptography techniques provide security to cloud user’s data by encrypting and decrypting data for intended users. The present paper proposes Ciphertext-Policy Identity-based Encryption (CP-IBE) as a cryptographic technique for cloud data. CP-IBE is combination of data encryption and identity-based approach. It is enhanced by integrating CP-IBE algorithm with Elliptic Curve Cryptography (ECC) that gives a novel scheme for public-key cryptography known as Ciphertext-Policy Identity-based Elliptic Curve Cryptography (CP-IBE-ECC). Torsion point concept is used in the Elliptic Curve Cryptography (ECC) system. An elliptic curve is the formation of curve under an algebraic set of coordinates which does not intersect with other points during curve formation. This merit makes us define a new security model in healthcare applications. None of the studies has explored the merits of applying torsion points on key distribution system. It provides dynamic data support, efficiency, security as well as privacy for E-Healthcare System. This system focus on storing and maintaining the Health Records of patients electronically so refer these records as EHR. The EHRs are migrated to the cloud data centers in order to prevent medical errors and to have efficient storage and access to those records. IBE encryption technique is also applied in order to make EHRs more secure. The Shared Nearest Neighbor (SNN) clustering is applied to resolve the issues with attribute clustering. SNN works on estimating the nearest neighbors for the most shared attributes and then clusters the records.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. J. Comput. 32(3), 586–615 (2003)

    Article  MathSciNet  Google Scholar 

  2. Wang, Q., Li, F., Wang, H.: An anonymous multireceiver with online/offline identity-based encryption. In: Hindawi Wireless Communications and Mobile Computing, pp. 1–18 (2018)

    Google Scholar 

  3. Hu, Z., Liu, S., Liu, J.: Revocable identity-based encryption and server-aided revocable IBE from the computational Diffie-Hellman assumption. Cryptogr. MDPI 2, 1–18 (2018)

    Article  Google Scholar 

  4. Ding, S., Li, C., Li, H.: A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. Special Section on Security and Trusted Computing for Industrial, IEEE Access 6, 27336–27345 (2018)

    Article  Google Scholar 

  5. Clark, P.L., Cook, B., Stankewic, J.: Torsion Points on Elliptic Curves with Complex Multiplication (2013)

    Google Scholar 

  6. Lee-Post, A., Pakath, R.: Cloud Computing: A Comprehensive Introduction. Information Science Reference (an imprint of IGI Global), pp. 1–23 (2014)

    Google Scholar 

  7. Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2015)

    Article  MathSciNet  Google Scholar 

  8. Wang, J., Chen, X.: Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64, 3293–3303 (2015)

    Article  MathSciNet  Google Scholar 

  9. Ni, J., Li, G., et. al.: Adaptive database schema design for multi-tenant data management. IEEE Trans. Knowl. Data Eng. 26(9), 2079–2093 (2013)

    Article  Google Scholar 

  10. Licenciado, Doutor João Carlos Gomes Moura Pires.: Implementation for Spatial Data of the Shared Nearest Neighbour with Metric, pp. 1–71 (2012)

    Google Scholar 

  11. Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: ICALP Part II, LNCS, vol. 5126, pp. 579–591. Springer, Berlin, Heidelberg (2008)

    Google Scholar 

  12. Li, Q., Zhu, H., Ying, Z., Zhang, T.: Traceable ciphertext-policy attribute-based encryption with verifiable outsourced decryption in eHealth cloud. Hindawi Wirel. Commun. Mob. Comput. 2018(2018), 1–12 (2018)

    Google Scholar 

  13. Abdullah, K.E., Ali, N.H.M.: Security improvement in elliptic curve cryptography. Int. J. Adv. Comput. Sci. Appl. 9(5), 122–131 (2018)

    Google Scholar 

  14. Ma, X., Wang, X., Lin, D.: Anonymous Identity-Based Encryption with. In: ACISP, pp. 1–10 (2018)

    Google Scholar 

  15. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 110–122 (2007)

    Google Scholar 

  16. Dharmadhikari, D., Tamne, S.: Public Auditing Schemes (PAS) for Dynamic Data in Cloud: A Review. In: SmartCom 2017, CCIS 876, pp. 186–191. Springer (2018)

    Google Scholar 

  17. Naveen Bail, B., Mary Sowjana, A.: An incremental shared nearest neighbour clustering approach for numerical data using an efficient distance measure, Vishakhapatnam. Int. J. Adv. Trends Comput. Sci. Eng. 4(9), pp. 14192–14196 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dipa D. Dharamadhikari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dharamadhikari, D.D., Tamane, S.C. (2020). Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE). In: Zhang, YD., Mandal, J., So-In, C., Thakur, N. (eds) Smart Trends in Computing and Communications. Smart Innovation, Systems and Technologies, vol 165. Springer, Singapore. https://doi.org/10.1007/978-981-15-0077-0_21

Download citation

Publish with us

Policies and ethics