Skip to main content

PriGen: A Generic Framework to Preserve Privacy of Healthcare Data in the Cloud

  • Conference paper
Inclusive Society: Health and Wellbeing in the Community, and Care at Home (ICOST 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7910))

Included in the following conference series:

Abstract

With the rise of Healthcare IT infrastructures, the need of healthcare data sharing and integration has become extremely important. Cloud computing paradigm is one of the most popular healthcare IT infrastructures for facilitating electronic health record sharing and integration. Many predict that managing healthcare applications with clouds will make revolutionary change in the way we do healthcare today. Enabling the access to ubiquitous healthcare not only will help us improve healthcare as our data will always be accessible from anywhere at any time, but also it helps cutting down the costs drastically. However, since healthcare data contains lots of sensitive private information, how to protect data privacy within the untrusted cloud is facing a huge challenge. Thus, a mechanism to protect the privacy of healthcare data is needed when these data are stored and processed within the cloud to provide various medical services. To address this issue, in this paper, we present a generic framework named PriGen that preserves the privacy of sensitive healthcare data in the cloud. PriGen allows the users to preserve privacy while accessing cloud based healthcare service without the help of a trusted third party. With making use of homomorphic encryption function on sensitive private information; our proposed framework maintains confidentiality of private information sent by the cloud users to untrusted cloud based healthcare service providers. In this paper, we also present a brief discussion of different components of PriGen framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Waegemann, C.P.: Spotlight on healthcare: document imaging in healthcare: one piece of the puzzle in creating electronic patient record system. Inform 14 i1, 8–10

    Google Scholar 

  2. Samarati, P.: Protecting respondents’ identities in micro data release. IEEE Transactions on Knowledge Engineering 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  3. HIPAA-General Information, http://www.cms.gov/HIPAAGenInfo/

  4. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey on recent developments. ACM Computing Surveys 42(4) (June 2010)

    Google Scholar 

  5. Aggarwal, C.C., Yu, P.S.: A General Survey of Privacy-Preserving Data Mining Models and Algorithms. The Kluwer International Series on Advances in Database Systems, vol. 34, pp. 11–52 (2008)

    Google Scholar 

  6. Smith, H.E.: A Context-Based Access Control Model for HIPAA Privacy and Security Compliance. SANS Institute (2001)

    Google Scholar 

  7. Lillian, R., Nytr, Y.: Personalized access control for a personally controlled health record. In: Proc. of Workshop on Computer Security Architectures, USA, pp. 9–16 (2008)

    Google Scholar 

  8. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: Proc. of INFOCOM 2010, pp. 1–9 (2010)

    Google Scholar 

  9. Itani, W., Kayssi, A., Chehab, A.: Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. In: Proc. of DASC 2009, pp. 711–716 (2009)

    Google Scholar 

  10. Zhang, R., Liu, L.: Security Models and Requirements for Healthcare Application Clouds. In: Proc. of Cloud Computing 2010, pp. 268–275 (2010)

    Google Scholar 

  11. Huang, R., Gui, X., Yu, S., Zhuang, W.: Study of privacy-preserving framework for cloud storage. Comput. Sci. Inf. Syst. 8(3), 801–819 (2011)

    Article  Google Scholar 

  12. Gellman, R.: WPF REPORT: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing (February 23, 2009)

    Google Scholar 

  13. Cavoukian, A.: Privacy in the clouds. In: Springer Identity in the Information Society, Published online (December 18, 2008)

    Google Scholar 

  14. Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: Proc. of CCS 2004, pp. 168–177 (2004)

    Google Scholar 

  15. Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  16. Desmedt, Y.: Threshold cryptography. European Trans. on Telecommunications 5 (1994)

    Google Scholar 

  17. Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 28, 1030–1044 (1985)

    Article  Google Scholar 

  18. Pearson, S.: Taking Account of privacy when designing cloud computing services. In: Proc. of ICSE-Cloud 2009 (2009)

    Google Scholar 

  19. Recommendation No. R (97) 5 on the Protection of Medical Data, http://www.coe.int/t/dghl/standardsetting/dataprotection/Legal_instruments_en.asp

  20. Ishna, N., Douglass, M.M., Lehman, L.H., Reisner, A., Villarroel, M., Long, W.J., Szolovits, P., Moody, G.B., Mark, R.G., Clifford, G.D.: Automated de-identification of free-text medical records. BMC Medical Informatics & Decision Making 1(8), 32–49 (2008)

    Google Scholar 

  21. Chen, L., Yang, J., Wang, Q., Niu, Y.: A framework for privacy-preserving healthcare data sharing. In: Proc. of Healthcom 2012, pp. 341–346 (2012)

    Google Scholar 

  22. Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  23. Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  24. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communication of ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  25. Gentry, C.: Computing arbitrary functions of encrypted data. Communication of ACM 53(3), 97–105 (2010)

    Article  Google Scholar 

  26. Liu, Q., Wang, G., Wu, J.: An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. In: Proc. of Conference on Computational Science and Engineering, pp. 715–720

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rahman, F., Ahamed, S.I., Yang, JJ., Wang, Q. (2013). PriGen: A Generic Framework to Preserve Privacy of Healthcare Data in the Cloud. In: Biswas, J., Kobayashi, H., Wong, L., Abdulrazak, B., Mokhtari, M. (eds) Inclusive Society: Health and Wellbeing in the Community, and Care at Home. ICOST 2013. Lecture Notes in Computer Science, vol 7910. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39470-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39470-6_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39469-0

  • Online ISBN: 978-3-642-39470-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics