Advertisement

Anonymous-CPABE: Privacy Preserved Content Disclosure for Data Sharing in Cloud

  • S. SabithaEmail author
  • M. S. Rajasree
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9017)

Abstract

Healthcare Providers are widely using Cloud Computing to securely share Electronic Health Record(EHR). Entire EHR data cannot be disclosed to all the users with different privilege level, since it is more privacy sensitive. So Healthcare Provider has to enforce a privacy preserved access control mechanism to efficiently share EHR. Privacy preserved secure data sharing is one of the most challenging issues in cloud environment. Existing access control mechanisms for data sharing do not consider the privacy of individuals, who are the subjects of data which is being shared while preventing user revocation problem. To address these problems, we are proposing a novel idea in which, users whose attributes satisfy the access policy and access rights are effective in access time can recover the corresponding data. Proposed scheme is able to ensure security, integrity, privacy preserved fine-grained access control and prevent data mining attacks on shared data. Even though this paper focuses on EHR sharing, it can be generalized to privacy preserved data sharing.

Keywords

Cloud computing Ciphertext-policy attribute-based encryption Re-encryption Anonymization 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: Sirius: securing remote untrusted storage. In: Network and Distributed Systems Security Symposium (NDSS), pp. 131–145 (2003)Google Scholar
  2. 2.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security (CCS), pp. 89–98 (2006)Google Scholar
  3. 3.
    Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007) CrossRefGoogle Scholar
  4. 4.
    Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: scalable secure file sharing on untrusted storage. In: USENIX Conference on File and Storage Technologies (FAST), pp. 29–42 (2003)Google Scholar
  5. 5.
    Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)CrossRefzbMATHMathSciNetGoogle Scholar
  6. 6.
    Sedayao, J.: Enhancing cloud security using data anonymization. Intel white paper on Cloud computing and information security, June 2012Google Scholar
  7. 7.
    Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: ACM Conference on Computer and Communications Security (CCS), pp. 735–737 (2010)Google Scholar
  8. 8.
    Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002) CrossRefGoogle Scholar
  9. 9.
    Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Information Sciences, pp. 355–370 (2014)Google Scholar
  10. 10.
    Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers and Security 30(5), 320–331 (2011)CrossRefGoogle Scholar
  11. 11.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)Google Scholar
  12. 12.
    Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005) CrossRefGoogle Scholar
  13. 13.
    Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: ACM Conference on Computer and Communication Security, pp. 195–203 (2007)Google Scholar
  14. 14.
    The Pairing-Based Cryptography Library (2012). http://crypto.stanford.edu/pbc/
  15. 15.
    Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy Preserving Data Publishing: A Survey of Recent Developments. ACM Computing Surveys 42(4), Article 14 June (2010)Google Scholar
  16. 16.
    Jansen, W., Grance, T.: Guidelines on Security and Privacy in Public Cloud Computing. NIST Special Publication, December (2011)Google Scholar
  17. 17.
    Wang, C-J., Luo, J.F.: A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext. In: 8th International Conference on Computational Intelligence and Security, pp. 447–451, November (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringCollege of EngineeringTrivandrumIndia
  2. 2.IIITM-KTrivandrumIndia

Personalised recommendations