Design an attribute based health record protection algorithm for healthcare services in cloud environment
- 33 Downloads
Nowadays, personal health records (PHR) has built as a platform for health care data trading. The realistic deployment of PHR in distributed computing infrastructure raises the protection and data security hazards that need to be addressed. However, there have been broad security concerns as personal health data. It could be raised for external servers and treated as unauthenticated cloud servers. The large amount of clients and data owners in the PHR framework who have possibly heavy computational and administration load on the elements in the framework; which will restrict the PHR information accessibility and usability. To find a better solution of above issues, Attribute-based Health Record Protection (AHRP) algorithm is introduced to offer information access control confidentiality, credibility, and secrecy. It is provision of access control to encrypt the information, and a privilege mode for authenticating a message without uncovering the personal information of the patient. Based on Experimental evaluations, proposed Attribute based Health Record Protection Algorithm reduces 0.364 ET (encryption time) in seconds, 0.188 DT (Decryption Time) in seconds for respective records compared than existing methodologies.
KeywordsPrivacy-preserving Cloud computing E-health reports and analysis Attribute-based health record protection algorithm Patient health record (PHR)
The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through General Research Project under grant number (G.R.P- 76-1440). I would like to thank King Khalid university for the necessary support to lead this paper, we thank our colleagues who sustained greatly assisted this research. We would also like to show our gratitude to for sharing their pearls of wisdom with us during this research, and we thank “anonymous” reviewers for their socalled insights.
- 1.Duncan B, Whittington M (2014). Reflecting on whether checklists can tick the box for cloud security. In Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on (pp. 805–810).IEEEGoogle Scholar
- 2.Duncan B, Pym DJ, Whittington M (2013).Developing a conceptual framework for cloud security assurance.In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Vol. 2, pp. 120–125).IEEEGoogle Scholar
- 4.Fern'ndez, G., De La Torre-díez, I., & Rodrigues, J. J. (2012). Analysis of the cloud computing paradigm on Mobile Health Records Systems. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on (pp. 927–932). IEEEGoogle Scholar
- 5.Ioannidis C, Pym D, Williams J (2014) Sustainability in information stewardship: time preferences, externalities, and social coordination. RN 14:15Google Scholar
- 7.M Kumari, P.S., & Kamal, A.N.B., “Optimal integrity policy for encrypted data in secure storage using cloud computing," Indian J Sci Technol, vol.9, no.8,2016, pp.1–10,2016.Google Scholar
- 8.Monikandan S, Arockiam L (2014) A security service algorithm to ensure the confidentiality of data in cloud storage. Int J Eng Res Technol 3(12):1053–1058Google Scholar
- 9.Motwani P, Saxena P (2016) Cloud data outsourcing and off sourcing using trust computation. International Journal of Computer Science and Information Technologies 7(3):1417–1424Google Scholar
- 11.Ruebsamen T, Reich C (2013).Supporting cloud accountability by collecting evidence using audit agents.In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Vol. 1, pp. 185–190).IEEEGoogle Scholar
- 12.Thorpe S, Grandison T, Campbell A, Williams J, Burrell K, Ray I (2013).Towards a forensic-based service-oriented architecture framework for auditing of cloud logs.In Services (SERVICES), 203 IEEE Ninth World Congress on (pp. 75–83).IEEEGoogle Scholar
- 13.Zhang R, Liu L (2010). Security models and requirements for healthcare application clouds.In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on (pp. 268–275).IEEEGoogle Scholar