Advertisement

Design an attribute based health record protection algorithm for healthcare services in cloud environment

  • Azath MubarakaliEmail author
  • M. Ashwin
  • Dinesh Mavaluru
  • A. Dinesh Kumar
Article
  • 33 Downloads

Abstract

Nowadays, personal health records (PHR) has built as a platform for health care data trading. The realistic deployment of PHR in distributed computing infrastructure raises the protection and data security hazards that need to be addressed. However, there have been broad security concerns as personal health data. It could be raised for external servers and treated as unauthenticated cloud servers. The large amount of clients and data owners in the PHR framework who have possibly heavy computational and administration load on the elements in the framework; which will restrict the PHR information accessibility and usability. To find a better solution of above issues, Attribute-based Health Record Protection (AHRP) algorithm is introduced to offer information access control confidentiality, credibility, and secrecy. It is provision of access control to encrypt the information, and a privilege mode for authenticating a message without uncovering the personal information of the patient. Based on Experimental evaluations, proposed Attribute based Health Record Protection Algorithm reduces 0.364 ET (encryption time) in seconds, 0.188 DT (Decryption Time) in seconds for respective records compared than existing methodologies.

Keywords

Privacy-preserving Cloud computing E-health reports and analysis Attribute-based health record protection algorithm Patient health record (PHR) 

Notes

Acknowledgements

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through General Research Project under grant number (G.R.P- 76-1440). I would like to thank King Khalid university for the necessary support to lead this paper, we thank our colleagues who sustained greatly assisted this research. We would also like to show our gratitude to for sharing their pearls of wisdom with us during this research, and we thank “anonymous” reviewers for their socalled insights.

References

  1. 1.
    Duncan B, Whittington M (2014). Reflecting on whether checklists can tick the box for cloud security. In Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on (pp. 805–810).IEEEGoogle Scholar
  2. 2.
    Duncan B, Pym DJ, Whittington M (2013).Developing a conceptual framework for cloud security assurance.In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Vol. 2, pp. 120–125).IEEEGoogle Scholar
  3. 3.
    Fernández-Cardeñosa G, de la Torre-Díez I, López-Coronado M, Rodrigues JJ (2012) Analysis of cloud-based solutions on EHRs systems in different scenarios. J Med Syst 36(6):3777–3782CrossRefGoogle Scholar
  4. 4.
    Fern'ndez, G., De La Torre-díez, I., & Rodrigues, J. J. (2012). Analysis of the cloud computing paradigm on Mobile Health Records Systems. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on (pp. 927–932). IEEEGoogle Scholar
  5. 5.
    Ioannidis C, Pym D, Williams J (2014) Sustainability in information stewardship: time preferences, externalities, and social coordination. RN 14:15Google Scholar
  6. 6.
    Low C, Chen YH (2012) Criteria for the evaluation of a cloud-based hospital information system outsourcing provider. J Med Syst 36(6):3543–3553CrossRefGoogle Scholar
  7. 7.
    M Kumari, P.S., & Kamal, A.N.B., “Optimal integrity policy for encrypted data in secure storage using cloud computing," Indian J Sci Technol, vol.9, no.8,2016, pp.1–10,2016.Google Scholar
  8. 8.
    Monikandan S, Arockiam L (2014) A security service algorithm to ensure the confidentiality of data in cloud storage. Int J Eng Res Technol 3(12):1053–1058Google Scholar
  9. 9.
    Motwani P, Saxena P (2016) Cloud data outsourcing and off sourcing using trust computation. International Journal of Computer Science and Information Technologies 7(3):1417–1424Google Scholar
  10. 10.
    Poulymenopoulou M, Malamateniou F, Vassilacopoulos G (2012) Emergency healthcare process automation using mobile computing and cloud services. J Med Syst 36(5):3233–3241CrossRefGoogle Scholar
  11. 11.
    Ruebsamen T, Reich C (2013).Supporting cloud accountability by collecting evidence using audit agents.In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Vol. 1, pp. 185–190).IEEEGoogle Scholar
  12. 12.
    Thorpe S, Grandison T, Campbell A, Williams J, Burrell K, Ray I (2013).Towards a forensic-based service-oriented architecture framework for auditing of cloud logs.In Services (SERVICES), 203 IEEE Ninth World Congress on (pp. 75–83).IEEEGoogle Scholar
  13. 13.
    Zhang R, Liu L (2010). Security models and requirements for healthcare application clouds.In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on (pp. 268–275).IEEEGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Azath Mubarakali
    • 1
    Email author
  • M. Ashwin
    • 2
  • Dinesh Mavaluru
    • 3
  • A. Dinesh Kumar
    • 4
  1. 1.College of Computer Science, Department of CNEKing Khalid UniversityAbhaSaudi Arabia
  2. 2.Department of Computer Science and EngineeringKoneru Lakshmaiah Education FoundationAndra PrdeshIndia
  3. 3.College of Computing and InformaticsSaudi Electronic UniversityAbhaSaudi Arabia
  4. 4.Department of Computer Science and EngineeringKoneru Lakshmaiah Education FoundationAndra PrdeshIndia

Personalised recommendations