Skip to main content

Implementing Ciphertext Policy Encryption in Cloud Platform for Patients’ Health Information Based on the Attributes

  • Conference paper
  • First Online:
Computational Methods and Data Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1227))

Abstract

The cloud computing platform has to improvise the healthcare authorities along with organization. In health industry has to develop the patients to make, organize and give out their health-related data with different users by the personal health record (PHR) administration and in addition to health insurance companies. The proposed method explains the work on outlining and implementing patient-driven, patient health information in a cloud platform in light of open-source Indivo X framework. The PHR administration level is to be facilitated about outsourcing patients’ PHR information to cloud servers with a specific end goal to upgrade its interoperability. The security saving PHR structure utilizes attribute-based encryption (ABE) and supplies the system with the goal that patients be competent to scramble their PHRs and store them on cloud servers which is half believed to such an extent that servers do not have confirmation to basic PHR data and the patients keep up full power over entrée to their PHR records, by doling out access to some approved data users, while individual users can have entry to various parts of their PHR.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akinyele JA, Pagano MW, Green MD, Lehmann CU, Peterson ZNJ, Rubin AD (2011) Securing electronic medical records using attribute-based encryption on mobile devices. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, Chicago, pp 75–86, 2011

    Google Scholar 

  2. Fabian B, Ermakova T, Junghanns P (2015) Collaborative and secure sharing of healthcare data in multi-clouds. Inf Syst 48:132–150. https://doi.org/10.1016/j.is.2014.05.004

    Article  Google Scholar 

  3. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute based encryption for fine-grained access conrol of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, pp 89–98, 2006

    Google Scholar 

  4. Goyal V (2007) Certificate revocation using fine grained certificate space partitioning. In: Financial cryptography and data security, pp 247–259, 2007, Lecture Notes in Computer Science, vol 4886. Springer, Berlin, Heidelberg

    Google Scholar 

  5. Ibraimi L, Asim M, Petkovic M (2009) Secure management of personal health records by applying attribute-based encryption. In: 6th International workshop on wearable micro and nano technologies for personalized health (pHealth), pp 71–74, 2009

    Google Scholar 

  6. Li M, Yu SC, Zheng Y, Ren K, Lou WJ (2013) Scalable and secure sharing of personal health records in cloud computing using attribute based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143

    Article  Google Scholar 

  7. Li M, Yu S, Ren K, Lou W (2010) Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Security and privacy in communication networks 6th international ICST conference: secure communication networks 2010, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 50, Springer, Singapore, pp 89–106, 2010. https://doi.org/10.1007/978-3-642-16161-2_6

  8. Mandl KD, Simons WW, Crawford WC, Abbett JM (2007) Indivo: a personally controlled health record for health information exchange and communication. BMC Med Inform Decis Mak 7(25):1–10. https://doi.org/10.1186/1472-6947-7-25

    Article  Google Scholar 

  9. Mohan A, Bauer D, Blough DM, Ahamad M, Bamba B, Krishnan R, Liu L, Mashima D, Palanisamy B (2009) A patient-centric, attribute based, source-verifiable framework for health record sharing. GIT CERCS Technical Report No. GIT-CERCS-09-11

    Google Scholar 

  10. Narayan S, Gagné M, Safavi-Naini R (2010) Privacy preserving EHR system using attribute-based infrastructure. In: CCSW 2010, pp 47–52, 2010

    Google Scholar 

  11. Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security, pp 195–203, 2007

    Google Scholar 

  12. Personally Controlled Health Record (PCHR) system using attributed-based encryption project, The pyabelib toolkit, https://code.google.com/p/abe-pchr

  13. Sahai A, Waters B (2005) Fuzzy identity based encryption. In: EUROCRYPT 2005, LNCS 3494, Springer, pp 457–473

    Google Scholar 

  14. Wang C, Liu X, Li W (2012) Implementing a personal health record cloud platform using ciphertext-policy attribute-based encryption. In: 4th international conference on Intelligent networking and collaborative systems (INCoS), pp 8–14. IEEE, 2012

    Google Scholar 

  15. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: 14th international conference on practice and theory in public key cryptography, LNCS 6571. Springer, pp 53–70, 2011

    Google Scholar 

  16. Yin C, Zhang R (2011) Access control for the smart meters based on ABE. In: 2011 international conference on cyber-enabled distributed computing and knowledge discovery, pp 79–82, 2011

    Google Scholar 

  17. Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Infocom, 2010 proceedings IEEE. IEEE 2010, pp 1–9

    Google Scholar 

  18. Zheng Y (2011) Privacy-preserving personal health record system using attribute-based encryption, MS thesis, Worcester Polytechnic Institute

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suman Madan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Boopalan, S., Ramkumar, K., Ananthi, N., Goswami, P., Madan, S. (2021). Implementing Ciphertext Policy Encryption in Cloud Platform for Patients’ Health Information Based on the Attributes. In: Singh, V., Asari, V., Kumar, S., Patel, R. (eds) Computational Methods and Data Engineering. Advances in Intelligent Systems and Computing, vol 1227. Springer, Singapore. https://doi.org/10.1007/978-981-15-6876-3_44

Download citation

Publish with us

Policies and ethics