Skip to main content

Preserving and Scrambling of Health Records with Multiple Owner Access Using Enhanced Break-Glass Algorithm

  • Conference paper
  • First Online:
Computer Networks, Big Data and IoT

Abstract

Cloud computing servers gives a stage for the clients to remotely store information and offer the information to everyone. Healthcare record management system (HRMS) has been developed as a tolerant-driven model for health-related data exchange. Classification of the common information, i.e., visit details, report details, etc., remains as a serious issue when patients utilize public cloud servers since it might be viewed by everyone. To guarantee the patient’s control over admittance to their own uncommon well-being records, it is a promising technique to encode the reports before redistributing and pick up the gain power to that data. Security introduction, adaptability in key association, and flexible access experience have remained the most essential difficulties toward accomplishing fine-grained, cryptographically endorsed data get the opportunity to control. This research work proposes an arrangement of systems for information get to control to healthcare record management system (HRMS) put away in outsider servers with classification of data into public and private data. In HRMS for accomplishing smooth and adaptable information get the chance to control, attribute-based encryption (ABE) methodologies are utilized to encode each patient’s HRMS record for getting to. While providing secure data outsourcing, the main concentration is the multiple owners of data. On account of this framework significantly diminishes the key administration unpredictability for information owners and clients, HRMS ensured a high level of patient security. With respect to emergency situations, a break-glass extraction method is introduced here to access the data in emergency situations with authorized keys.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wu J, Dong M, Ota K, Li J, Guan Z (2018) Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Netw Serv Manag 15:27–38

    Article  Google Scholar 

  2. Wu J, Dong M, Ota K, Li J, Guan Z (2018) FCSS: fog computing based content-aware filtering for security services in information centric social networks. IEEE Trans Emerg Top, Comput

    Google Scholar 

  3. Guo L, Dong M, Ota K, Li Q, Ye T, Wu J, Li J (2017) A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet Things J 4:601–610

    Article  Google Scholar 

  4. Wu J, Ota K, Dong M, Li C (2016) A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4:416–424

    Article  Google Scholar 

  5. Dwivedi AD, Morawiecki P, WĂ³jtowicz S (2018) Finding differential paths in ARX ciphers through nested monte-carlo search. Int J Electron Telecommun 64:147–150

    Google Scholar 

  6. Dwivedi AD, Morawiecki P, Singh R, Dhar S (2018) Differential-linear and related key cryptanalysis of round-reduced scream. Inf Process Lett 136:5–8

    Article  MathSciNet  Google Scholar 

  7. Dwivedi AD, Srivastava G (2018) Differential cryptanalysis of round-reduced LEA. IEEE Access

    Google Scholar 

  8. Dwivedi AD, Morawiecki P, WĂ³jtowicz S (2017) Differential and rotational cryptanalysis of round-reduced MORUS. In: Proceedings of the 14th international joint conference on e-business and telecommunications, Madrid, Spain, 24–26 July 2017; pp 275–284

    Google Scholar 

  9. Dwivedi AD, Morawiecki P (2019) Differential cryptanalysis in ARX Ciphers, application to SPECK. Cryptology ePrint Archive: Report 2018/899. 2018. Available online: https://eprint.iacr.org/2018/899. Accessed on 9 Jan 2019

  10. Dwivedi AD, Morawiecki P, WĂ³jtowicz S (2017) Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, Madrid, Spain, 24–26 July 2017; pp. 501–506

    Google Scholar 

  11. Luo L, Guojun QW (2016) Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20(9):1772–1775

    Article  Google Scholar 

  12. Mao et al (2016) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Dependable Secure Comput 13.5:533–546

    Google Scholar 

  13. Dwivedi AD, Kloucek M, Morawiecki P, Nikolic I, Pieprzyk J, WĂ³jtowicz S (2017) SAT-based cryptanalysis of authenticated ciphers from the CAESAR competition. In: Proceedings of the 14th international joint conference on e-business and telecommunications, Madrid, Spain, 24–26 July 2017, pp 237–246

    Google Scholar 

  14. Maw HA et al (2016) BTG-AC: Break-the-glass access control model for medical data in wireless sensor networks. IEEE J Biomed Health Inf 20(3):763–774

    Article  Google Scholar 

  15. Li M, Yu S, Ren K, Lou W (2010) Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia S, Zhou J, (eds) Security and privacy in communication networks. Springer Berlin Heidelberg

    Google Scholar 

  16. Berlin/Heidelberg, Germany, 2010; pp 89–106

    Google Scholar 

  17. Mandl KD, Markwell D, MacDonald R, Szolovits P, Kohane IS (2001) Public standards and patients’ control: how to keep electronic medical records accessible but private. BMJ 322:283–287

    Article  Google Scholar 

  18. Wu J, Dong M, Ota K, Li J, Guan Z (2018) Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Netw Serv Manag 15:27–38

    Google Scholar 

  19. Sun W et al (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198

    Article  Google Scholar 

  20. Yang K et al (2016) Time-domain attribute-based access control for cloud-based video content sharing: a cryptographic approach. IEEE Trans Multimedia 18(5):940–950

    Article  Google Scholar 

  21. Shakya S (2019) An efficient security framework for data migration in a cloud computing environment. J Artif Intell 1(01):45–53

    Google Scholar 

  22. Suma V (2020) A novel information retrieval system for distributed cloud using hybrid deep fuzzy hashing algorithm. J Inf Technol 2(03):151–160

    Google Scholar 

  23. https://lucidoutsourcing.com/blog/cloud-computing

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pimple, K.U., Dongre, N.M. (2021). Preserving and Scrambling of Health Records with Multiple Owner Access Using Enhanced Break-Glass Algorithm. In: Pandian, A., Fernando, X., Islam, S.M.S. (eds) Computer Networks, Big Data and IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 66. Springer, Singapore. https://doi.org/10.1007/978-981-16-0965-7_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-0965-7_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-0964-0

  • Online ISBN: 978-981-16-0965-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics