Abstract
Cloud computing servers gives a stage for the clients to remotely store information and offer the information to everyone. Healthcare record management system (HRMS) has been developed as a tolerant-driven model for health-related data exchange. Classification of the common information, i.e., visit details, report details, etc., remains as a serious issue when patients utilize public cloud servers since it might be viewed by everyone. To guarantee the patient’s control over admittance to their own uncommon well-being records, it is a promising technique to encode the reports before redistributing and pick up the gain power to that data. Security introduction, adaptability in key association, and flexible access experience have remained the most essential difficulties toward accomplishing fine-grained, cryptographically endorsed data get the opportunity to control. This research work proposes an arrangement of systems for information get to control to healthcare record management system (HRMS) put away in outsider servers with classification of data into public and private data. In HRMS for accomplishing smooth and adaptable information get the chance to control, attribute-based encryption (ABE) methodologies are utilized to encode each patient’s HRMS record for getting to. While providing secure data outsourcing, the main concentration is the multiple owners of data. On account of this framework significantly diminishes the key administration unpredictability for information owners and clients, HRMS ensured a high level of patient security. With respect to emergency situations, a break-glass extraction method is introduced here to access the data in emergency situations with authorized keys.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wu J, Dong M, Ota K, Li J, Guan Z (2018) Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Netw Serv Manag 15:27–38
Wu J, Dong M, Ota K, Li J, Guan Z (2018) FCSS: fog computing based content-aware filtering for security services in information centric social networks. IEEE Trans Emerg Top, Comput
Guo L, Dong M, Ota K, Li Q, Ye T, Wu J, Li J (2017) A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet Things J 4:601–610
Wu J, Ota K, Dong M, Li C (2016) A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4:416–424
Dwivedi AD, Morawiecki P, WĂ³jtowicz S (2018) Finding differential paths in ARX ciphers through nested monte-carlo search. Int J Electron Telecommun 64:147–150
Dwivedi AD, Morawiecki P, Singh R, Dhar S (2018) Differential-linear and related key cryptanalysis of round-reduced scream. Inf Process Lett 136:5–8
Dwivedi AD, Srivastava G (2018) Differential cryptanalysis of round-reduced LEA. IEEE Access
Dwivedi AD, Morawiecki P, WĂ³jtowicz S (2017) Differential and rotational cryptanalysis of round-reduced MORUS. In: Proceedings of the 14th international joint conference on e-business and telecommunications, Madrid, Spain, 24–26 July 2017; pp 275–284
Dwivedi AD, Morawiecki P (2019) Differential cryptanalysis in ARX Ciphers, application to SPECK. Cryptology ePrint Archive: Report 2018/899. 2018. Available online: https://eprint.iacr.org/2018/899. Accessed on 9 Jan 2019
Dwivedi AD, Morawiecki P, WĂ³jtowicz S (2017) Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, Madrid, Spain, 24–26 July 2017; pp. 501–506
Luo L, Guojun QW (2016) Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20(9):1772–1775
Mao et al (2016) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Dependable Secure Comput 13.5:533–546
Dwivedi AD, Kloucek M, Morawiecki P, Nikolic I, Pieprzyk J, WĂ³jtowicz S (2017) SAT-based cryptanalysis of authenticated ciphers from the CAESAR competition. In: Proceedings of the 14th international joint conference on e-business and telecommunications, Madrid, Spain, 24–26 July 2017, pp 237–246
Maw HA et al (2016) BTG-AC: Break-the-glass access control model for medical data in wireless sensor networks. IEEE J Biomed Health Inf 20(3):763–774
Li M, Yu S, Ren K, Lou W (2010) Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia S, Zhou J, (eds) Security and privacy in communication networks. Springer Berlin Heidelberg
Berlin/Heidelberg, Germany, 2010; pp 89–106
Mandl KD, Markwell D, MacDonald R, Szolovits P, Kohane IS (2001) Public standards and patients’ control: how to keep electronic medical records accessible but private. BMJ 322:283–287
Wu J, Dong M, Ota K, Li J, Guan Z (2018) Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Netw Serv Manag 15:27–38
Sun W et al (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198
Yang K et al (2016) Time-domain attribute-based access control for cloud-based video content sharing: a cryptographic approach. IEEE Trans Multimedia 18(5):940–950
Shakya S (2019) An efficient security framework for data migration in a cloud computing environment. J Artif Intell 1(01):45–53
Suma V (2020) A novel information retrieval system for distributed cloud using hybrid deep fuzzy hashing algorithm. J Inf Technol 2(03):151–160
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pimple, K.U., Dongre, N.M. (2021). Preserving and Scrambling of Health Records with Multiple Owner Access Using Enhanced Break-Glass Algorithm. In: Pandian, A., Fernando, X., Islam, S.M.S. (eds) Computer Networks, Big Data and IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 66. Springer, Singapore. https://doi.org/10.1007/978-981-16-0965-7_38
Download citation
DOI: https://doi.org/10.1007/978-981-16-0965-7_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0964-0
Online ISBN: 978-981-16-0965-7
eBook Packages: EngineeringEngineering (R0)