Abstract
Healthcare organizations are adopting Electronic Health Record (EHR) for better and fast services. Due to flexibility, security, and efficiency, cloud data storage has become a frequent alternative for deploying EHR systems. Several cryptography techniques provide security to cloud user’s data by encrypting and decrypting data for intended users. The present paper proposes Ciphertext-Policy Identity-based Encryption (CP-IBE) as a cryptographic technique for cloud data. CP-IBE is combination of data encryption and identity-based approach. It is enhanced by integrating CP-IBE algorithm with Elliptic Curve Cryptography (ECC) that gives a novel scheme for public-key cryptography known as Ciphertext-Policy Identity-based Elliptic Curve Cryptography (CP-IBE-ECC). Torsion point concept is used in the Elliptic Curve Cryptography (ECC) system. An elliptic curve is the formation of curve under an algebraic set of coordinates which does not intersect with other points during curve formation. This merit makes us define a new security model in healthcare applications. None of the studies has explored the merits of applying torsion points on key distribution system. It provides dynamic data support, efficiency, security as well as privacy for E-Healthcare System. This system focus on storing and maintaining the Health Records of patients electronically so refer these records as EHR. The EHRs are migrated to the cloud data centers in order to prevent medical errors and to have efficient storage and access to those records. IBE encryption technique is also applied in order to make EHRs more secure. The Shared Nearest Neighbor (SNN) clustering is applied to resolve the issues with attribute clustering. SNN works on estimating the nearest neighbors for the most shared attributes and then clusters the records.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. J. Comput. 32(3), 586–615 (2003)
Wang, Q., Li, F., Wang, H.: An anonymous multireceiver with online/offline identity-based encryption. In: Hindawi Wireless Communications and Mobile Computing, pp. 1–18 (2018)
Hu, Z., Liu, S., Liu, J.: Revocable identity-based encryption and server-aided revocable IBE from the computational Diffie-Hellman assumption. Cryptogr. MDPI 2, 1–18 (2018)
Ding, S., Li, C., Li, H.: A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. Special Section on Security and Trusted Computing for Industrial, IEEE Access 6, 27336–27345 (2018)
Clark, P.L., Cook, B., Stankewic, J.: Torsion Points on Elliptic Curves with Complex Multiplication (2013)
Lee-Post, A., Pakath, R.: Cloud Computing: A Comprehensive Introduction. Information Science Reference (an imprint of IGI Global), pp. 1–23 (2014)
Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2015)
Wang, J., Chen, X.: Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64, 3293–3303 (2015)
Ni, J., Li, G., et. al.: Adaptive database schema design for multi-tenant data management. IEEE Trans. Knowl. Data Eng. 26(9), 2079–2093 (2013)
Licenciado, Doutor João Carlos Gomes Moura Pires.: Implementation for Spatial Data of the Shared Nearest Neighbour with Metric, pp. 1–71 (2012)
Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: ICALP Part II, LNCS, vol. 5126, pp. 579–591. Springer, Berlin, Heidelberg (2008)
Li, Q., Zhu, H., Ying, Z., Zhang, T.: Traceable ciphertext-policy attribute-based encryption with verifiable outsourced decryption in eHealth cloud. Hindawi Wirel. Commun. Mob. Comput. 2018(2018), 1–12 (2018)
Abdullah, K.E., Ali, N.H.M.: Security improvement in elliptic curve cryptography. Int. J. Adv. Comput. Sci. Appl. 9(5), 122–131 (2018)
Ma, X., Wang, X., Lin, D.: Anonymous Identity-Based Encryption with. In: ACISP, pp. 1–10 (2018)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 110–122 (2007)
Dharmadhikari, D., Tamne, S.: Public Auditing Schemes (PAS) for Dynamic Data in Cloud: A Review. In: SmartCom 2017, CCIS 876, pp. 186–191. Springer (2018)
Naveen Bail, B., Mary Sowjana, A.: An incremental shared nearest neighbour clustering approach for numerical data using an efficient distance measure, Vishakhapatnam. Int. J. Adv. Trends Comput. Sci. Eng. 4(9), pp. 14192–14196 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dharamadhikari, D.D., Tamane, S.C. (2020). Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE). In: Zhang, YD., Mandal, J., So-In, C., Thakur, N. (eds) Smart Trends in Computing and Communications. Smart Innovation, Systems and Technologies, vol 165. Springer, Singapore. https://doi.org/10.1007/978-981-15-0077-0_21
Download citation
DOI: https://doi.org/10.1007/978-981-15-0077-0_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0076-3
Online ISBN: 978-981-15-0077-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)