Advertisement

Enhanced Secure Sharing of PHRs in Cloud Using Attribute-Based Encryption and Signature with Keyword Search

  • M. Lilly Florence
  • Dhina Suresh
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 645)

Abstract

Personal health record (PHR) is an emerging trend to exchange and share a person’s health information with the help of the third party cloud providers.There are many researches done using Attribute-Based Encryption (ABE) technique to share the information securely. A perfect signature guarantees unforgeability and privacy for the signer. In Attribute-Based Signature (ABS) with a set of attributes given by the authority, a signer can authenticate a message with a predicate. We provide a novel method “Enhanced Secure Sharing of PHRs in Cloud using Attribute-Based Encryption and Signature with Keyword Search” which ensures security, scalability, efficiency. In our proposed scheme, (i) the health records are encrypted using ABE (ii) it is authenticated using ABS scheme (iii) further we allow the user to search the encrypted data using the keywords.

Keywords

Attribute-Based Encryption Attribute-Based signature Authenticating Keyword search Security 

Notes

Acknowledgements

I would like to thank THE LORD MY SAVIOR for guiding and showering HIS blessings throughout my life. I take immense pleasure in thanking my guide Dr. M. Lilly Florence. I would like to thank my husband, parents, and my son for their patience and care.

References

  1. 1.
    104th United States congress, health insurance portability and accountability act of 1996 (HIPPA) (1996). http://aspe.hhs.gov/admnsimp/pl104191.htm
  2. 2.
    Adida, B.: Special topics in cryptography. Instructors: Canetti, R., Rivest, R. Lecture 25: pairing-based cryptography (2004)Google Scholar
  3. 3.
    Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Proceedings of crypto 98, pp. 26–45 (1998)Google Scholar
  4. 4.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, pp. 321–334 (2007)Google Scholar
  5. 5.
    Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Advances in cryptology Eurocrypt, vol. 3027, pp. 223–238. Springer, LNCS (2004)Google Scholar
  6. 6.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Proceedings of the 21st annual international cryptology conference on advances In: cryptology, pp. 213–229. Springer (2001)Google Scholar
  7. 7.
    California, Confidentiality of Medical Information Act (CMIA). www.leginfo.ca.gov/cgi-bin/displaycode?section=civ-group=00001-01000
  8. 8.
    Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multikeyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM (2011)Google Scholar
  9. 9.
    Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute-based encryption. In: CCS 09, pp. 121–130 (2009)Google Scholar
  10. 10.
    Chase, M.: Multi-authority attribute-based encryption. In: The 4th theory of cryptography conference (TCC 2007) (2007)Google Scholar
  11. 11.
    Chen, Y., Paxson, V., Katz, R.H.: Whats new about cloud computing security?. Technical report UCB/EECS-2010-5. University of California at Berkeley, Electrical Engineering and Computer Sciences (2010)Google Scholar
  12. 12.
  13. 13.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM conference on computer and communications security, pp. 89–98 (2006)Google Scholar
  14. 14.
    Ibraimi, L., Asim, M., Petkovic, M.: Secure management of personal health records by applying attribute-based encryption In: Technical report, University of Twente (2009)Google Scholar
  15. 15.
    Khader, D.: Attribute based group signatures. In: Proceedings of cryptology ePrint archive, Report 2007/159 (2007). http://eprint.iacr.org/2007/159
  16. 16.
    Li, M., Yu, S., Cao, N., Lou, W.: Authorized private keyword search over encrypted personal health records in cloud computing. In: Proceedings of ICDCS 11, Jun (2011)Google Scholar
  17. 17.
    Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distr. Syst. 24(1) (2013)Google Scholar
  18. 18.
    Liang, X., Lu, R., Lin, X., Shen, X.S.: Self-controllable access policy on phi in ehealthcare systems. In: Proceedings of AHIC 2010 (2010)Google Scholar
  19. 19.
    Liu, Q., Wang, G., Wu, J.: Secure and privacy preserving keyword searching for cloud storage services. J. Netw. Comput. Appl. 35(3), 927–933 (2012)Google Scholar
  20. 20.
    Lohr, H., Sadeghi, A.R., Winandy, M.: Securing the e-health cloud. In: Proceedings of the 1st ACM international health informatics symposium ser IHI 10, pp. 220–229 (2010)Google Scholar
  21. 21.
    Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures, In: Proceedings of CT-RSA11, vol. 6558, pp. 376–392, LNCS (2011)Google Scholar
  22. 22.
    Qian, H., Li, J., Zhang, Y., Han, J.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. IJIS, Springer (2014)Google Scholar
  23. 23.
    Racko, C., Simon, D.: Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Proceedings of crypto 91, pp. 433–444 (1991)Google Scholar
  24. 24.
    Sahai, A., Waters, B.: Fuzzy identity based encryption. In: Advances in cryptology—Eurocrypt, vol. 3494, pp. 457–473. Springer, LNCS (2005)Google Scholar
  25. 25.
    Shamir, A.: How to share a secret, 3rd edn, Commun. ACM 22(11), 612–613 (1979)Google Scholar
  26. 26.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 84 on advances in cryptology, pp. 47–53, Springer, NY (1985)Google Scholar
  27. 27.
    Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn (2006)Google Scholar
  28. 28.
    Sun, W., Yu, S., Lou, W., Hou, Y.T.: Your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. (2016)Google Scholar
  29. 29.
    Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of cryptology ePrint 2008/290 (2011)Google Scholar
  30. 30.
    Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE INFOCOM10 (2010)Google Scholar
  31. 31.
    Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE INFOCOM 2014 IEEE—ieeexplore.ieee.org (2014)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Adhiyamaan College of EngineeringHosurIndia
  2. 2.St.Joseph’s College of Arts and Science for WomenHosurIndia

Personalised recommendations