Abstract
With the rise of Healthcare IT infrastructures, the need of healthcare data sharing and integration has become extremely important. Cloud computing paradigm is one of the most popular healthcare IT infrastructures for facilitating electronic health record sharing and integration. Many predict that managing healthcare applications with clouds will make revolutionary change in the way we do healthcare today. Enabling the access to ubiquitous healthcare not only will help us improve healthcare as our data will always be accessible from anywhere at any time, but also it helps cutting down the costs drastically. However, since healthcare data contains lots of sensitive private information, how to protect data privacy within the untrusted cloud is facing a huge challenge. Thus, a mechanism to protect the privacy of healthcare data is needed when these data are stored and processed within the cloud to provide various medical services. To address this issue, in this paper, we present a generic framework named PriGen that preserves the privacy of sensitive healthcare data in the cloud. PriGen allows the users to preserve privacy while accessing cloud based healthcare service without the help of a trusted third party. With making use of homomorphic encryption function on sensitive private information; our proposed framework maintains confidentiality of private information sent by the cloud users to untrusted cloud based healthcare service providers. In this paper, we also present a brief discussion of different components of PriGen framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Waegemann, C.P.: Spotlight on healthcare: document imaging in healthcare: one piece of the puzzle in creating electronic patient record system. Inform 14 i1, 8–10
Samarati, P.: Protecting respondents’ identities in micro data release. IEEE Transactions on Knowledge Engineering 13(6), 1010–1027 (2001)
HIPAA-General Information, http://www.cms.gov/HIPAAGenInfo/
Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey on recent developments. ACM Computing Surveys 42(4) (June 2010)
Aggarwal, C.C., Yu, P.S.: A General Survey of Privacy-Preserving Data Mining Models and Algorithms. The Kluwer International Series on Advances in Database Systems, vol. 34, pp. 11–52 (2008)
Smith, H.E.: A Context-Based Access Control Model for HIPAA Privacy and Security Compliance. SANS Institute (2001)
Lillian, R., Nytr, Y.: Personalized access control for a personally controlled health record. In: Proc. of Workshop on Computer Security Architectures, USA, pp. 9–16 (2008)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: Proc. of INFOCOM 2010, pp. 1–9 (2010)
Itani, W., Kayssi, A., Chehab, A.: Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. In: Proc. of DASC 2009, pp. 711–716 (2009)
Zhang, R., Liu, L.: Security Models and Requirements for Healthcare Application Clouds. In: Proc. of Cloud Computing 2010, pp. 268–275 (2010)
Huang, R., Gui, X., Yu, S., Zhuang, W.: Study of privacy-preserving framework for cloud storage. Comput. Sci. Inf. Syst. 8(3), 801–819 (2011)
Gellman, R.: WPF REPORT: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing (February 23, 2009)
Cavoukian, A.: Privacy in the clouds. In: Springer Identity in the Information Society, Published online (December 18, 2008)
Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: Proc. of CCS 2004, pp. 168–177 (2004)
Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)
Desmedt, Y.: Threshold cryptography. European Trans. on Telecommunications 5 (1994)
Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 28, 1030–1044 (1985)
Pearson, S.: Taking Account of privacy when designing cloud computing services. In: Proc. of ICSE-Cloud 2009 (2009)
Recommendation No. R (97) 5 on the Protection of Medical Data, http://www.coe.int/t/dghl/standardsetting/dataprotection/Legal_instruments_en.asp
Ishna, N., Douglass, M.M., Lehman, L.H., Reisner, A., Villarroel, M., Long, W.J., Szolovits, P., Moody, G.B., Mark, R.G., Clifford, G.D.: Automated de-identification of free-text medical records. BMC Medical Informatics & Decision Making 1(8), 32–49 (2008)
Chen, L., Yang, J., Wang, Q., Niu, Y.: A framework for privacy-preserving healthcare data sharing. In: Proc. of Healthcom 2012, pp. 341–346 (2012)
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communication of ACM 21(2), 120–126 (1978)
Gentry, C.: Computing arbitrary functions of encrypted data. Communication of ACM 53(3), 97–105 (2010)
Liu, Q., Wang, G., Wu, J.: An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. In: Proc. of Conference on Computational Science and Engineering, pp. 715–720
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rahman, F., Ahamed, S.I., Yang, JJ., Wang, Q. (2013). PriGen: A Generic Framework to Preserve Privacy of Healthcare Data in the Cloud. In: Biswas, J., Kobayashi, H., Wong, L., Abdulrazak, B., Mokhtari, M. (eds) Inclusive Society: Health and Wellbeing in the Community, and Care at Home. ICOST 2013. Lecture Notes in Computer Science, vol 7910. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39470-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-39470-6_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39469-0
Online ISBN: 978-3-642-39470-6
eBook Packages: Computer ScienceComputer Science (R0)