Abstract
The cloud computing platform has to improvise the healthcare authorities along with organization. In health industry has to develop the patients to make, organize and give out their health-related data with different users by the personal health record (PHR) administration and in addition to health insurance companies. The proposed method explains the work on outlining and implementing patient-driven, patient health information in a cloud platform in light of open-source Indivo X framework. The PHR administration level is to be facilitated about outsourcing patients’ PHR information to cloud servers with a specific end goal to upgrade its interoperability. The security saving PHR structure utilizes attribute-based encryption (ABE) and supplies the system with the goal that patients be competent to scramble their PHRs and store them on cloud servers which is half believed to such an extent that servers do not have confirmation to basic PHR data and the patients keep up full power over entrée to their PHR records, by doling out access to some approved data users, while individual users can have entry to various parts of their PHR.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akinyele JA, Pagano MW, Green MD, Lehmann CU, Peterson ZNJ, Rubin AD (2011) Securing electronic medical records using attribute-based encryption on mobile devices. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, Chicago, pp 75–86, 2011
Fabian B, Ermakova T, Junghanns P (2015) Collaborative and secure sharing of healthcare data in multi-clouds. Inf Syst 48:132–150. https://doi.org/10.1016/j.is.2014.05.004
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute based encryption for fine-grained access conrol of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, pp 89–98, 2006
Goyal V (2007) Certificate revocation using fine grained certificate space partitioning. In: Financial cryptography and data security, pp 247–259, 2007, Lecture Notes in Computer Science, vol 4886. Springer, Berlin, Heidelberg
Ibraimi L, Asim M, Petkovic M (2009) Secure management of personal health records by applying attribute-based encryption. In: 6th International workshop on wearable micro and nano technologies for personalized health (pHealth), pp 71–74, 2009
Li M, Yu SC, Zheng Y, Ren K, Lou WJ (2013) Scalable and secure sharing of personal health records in cloud computing using attribute based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143
Li M, Yu S, Ren K, Lou W (2010) Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Security and privacy in communication networks 6th international ICST conference: secure communication networks 2010, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 50, Springer, Singapore, pp 89–106, 2010. https://doi.org/10.1007/978-3-642-16161-2_6
Mandl KD, Simons WW, Crawford WC, Abbett JM (2007) Indivo: a personally controlled health record for health information exchange and communication. BMC Med Inform Decis Mak 7(25):1–10. https://doi.org/10.1186/1472-6947-7-25
Mohan A, Bauer D, Blough DM, Ahamad M, Bamba B, Krishnan R, Liu L, Mashima D, Palanisamy B (2009) A patient-centric, attribute based, source-verifiable framework for health record sharing. GIT CERCS Technical Report No. GIT-CERCS-09-11
Narayan S, Gagné M, Safavi-Naini R (2010) Privacy preserving EHR system using attribute-based infrastructure. In: CCSW 2010, pp 47–52, 2010
Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security, pp 195–203, 2007
Personally Controlled Health Record (PCHR) system using attributed-based encryption project, The pyabelib toolkit, https://code.google.com/p/abe-pchr
Sahai A, Waters B (2005) Fuzzy identity based encryption. In: EUROCRYPT 2005, LNCS 3494, Springer, pp 457–473
Wang C, Liu X, Li W (2012) Implementing a personal health record cloud platform using ciphertext-policy attribute-based encryption. In: 4th international conference on Intelligent networking and collaborative systems (INCoS), pp 8–14. IEEE, 2012
Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: 14th international conference on practice and theory in public key cryptography, LNCS 6571. Springer, pp 53–70, 2011
Yin C, Zhang R (2011) Access control for the smart meters based on ABE. In: 2011 international conference on cyber-enabled distributed computing and knowledge discovery, pp 79–82, 2011
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Infocom, 2010 proceedings IEEE. IEEE 2010, pp 1–9
Zheng Y (2011) Privacy-preserving personal health record system using attribute-based encryption, MS thesis, Worcester Polytechnic Institute
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Boopalan, S., Ramkumar, K., Ananthi, N., Goswami, P., Madan, S. (2021). Implementing Ciphertext Policy Encryption in Cloud Platform for Patients’ Health Information Based on the Attributes. In: Singh, V., Asari, V., Kumar, S., Patel, R. (eds) Computational Methods and Data Engineering. Advances in Intelligent Systems and Computing, vol 1227. Springer, Singapore. https://doi.org/10.1007/978-981-15-6876-3_44
Download citation
DOI: https://doi.org/10.1007/978-981-15-6876-3_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-6875-6
Online ISBN: 978-981-15-6876-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)