Anonymous-CPABE: Privacy Preserved Content Disclosure for Data Sharing in Cloud
Healthcare Providers are widely using Cloud Computing to securely share Electronic Health Record(EHR). Entire EHR data cannot be disclosed to all the users with different privilege level, since it is more privacy sensitive. So Healthcare Provider has to enforce a privacy preserved access control mechanism to efficiently share EHR. Privacy preserved secure data sharing is one of the most challenging issues in cloud environment. Existing access control mechanisms for data sharing do not consider the privacy of individuals, who are the subjects of data which is being shared while preventing user revocation problem. To address these problems, we are proposing a novel idea in which, users whose attributes satisfy the access policy and access rights are effective in access time can recover the corresponding data. Proposed scheme is able to ensure security, integrity, privacy preserved fine-grained access control and prevent data mining attacks on shared data. Even though this paper focuses on EHR sharing, it can be generalized to privacy preserved data sharing.
KeywordsCloud computing Ciphertext-policy attribute-based encryption Re-encryption Anonymization
Unable to display preview. Download preview PDF.
- 1.Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: Sirius: securing remote untrusted storage. In: Network and Distributed Systems Security Symposium (NDSS), pp. 131–145 (2003)Google Scholar
- 2.Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security (CCS), pp. 89–98 (2006)Google Scholar
- 4.Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: scalable secure file sharing on untrusted storage. In: USENIX Conference on File and Storage Technologies (FAST), pp. 29–42 (2003)Google Scholar
- 6.Sedayao, J.: Enhancing cloud security using data anonymization. Intel white paper on Cloud computing and information security, June 2012Google Scholar
- 7.Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: ACM Conference on Computer and Communications Security (CCS), pp. 735–737 (2010)Google Scholar
- 9.Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Information Sciences, pp. 355–370 (2014)Google Scholar
- 11.Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)Google Scholar
- 13.Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: ACM Conference on Computer and Communication Security, pp. 195–203 (2007)Google Scholar
- 14.The Pairing-Based Cryptography Library (2012). http://crypto.stanford.edu/pbc/
- 15.Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy Preserving Data Publishing: A Survey of Recent Developments. ACM Computing Surveys 42(4), Article 14 June (2010)Google Scholar
- 16.Jansen, W., Grance, T.: Guidelines on Security and Privacy in Public Cloud Computing. NIST Special Publication, December (2011)Google Scholar
- 17.Wang, C-J., Luo, J.F.: A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext. In: 8th International Conference on Computational Intelligence and Security, pp. 447–451, November (2012)Google Scholar