Securing medical data by role-based user policy with partially homomorphic encryption in AWS cloud

被引:4
|
作者
Boomija, M. D. [1 ]
Raja, S. V. Kasmir [1 ]
机构
[1] SRM Inst Sci & Technol, Dept CSE, Kattankulathur, Tamil Nadu, India
关键词
Partially homomorphic encryption; Cloud security; Access policy; AWS S3; IAM; Elastic Beanstalk; ACCESS-CONTROL; STORAGE;
D O I
10.1007/s00500-022-06950-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud technology provides services for storing and accessing a large amount of data with ease of access and less cost. Sensitive data such as patients' electronic health information should be encrypted before outsourcing into the cloud. Many traditional encryption methods are used for protecting data in the cloud, but unable to perform computation on encrypted data. Homomorphic encryption operates directly on the ciphertext. In this study, a Secure Partially Homomorphic Encryption (SPHE) algorithm is proposed to secure the outsourced data and perform multiplication and division operations on the ciphertext. The access control policy in the cloud environment is more flexible. An attacker can easily collect sensitive data by abusing the access policy of another user. Therefore, the database privacy is compromised. Creating a role hierarchy and managing the session is difficult in the cloud environment. The above issues motivate us to develop a model which is the integration of the proposed scheme SPHE with role-based user policy. The model is implemented in Eclipse IDE (Integrated Development Environment) and AWS (Amazon Web Service) Toolkit for Eclipse and deployed in Amazon Elastic Beanstalk (EB) environment. This model is particularly used for securing the patient e-health details and performing computation on outsourced data. The patient details are encrypted by the algorithm SPHE and uploaded in AWS S3 (Simple Storage Service) bucket. The users are created by AWS Identity and Access Management (IAM) service and the access level policy is defined based on user roles in EB environment. The proposed model performance is studied by comparing with other partially homomorphic methods Elgamal, Pailler, and Benaloh. This model achieves data integrity and data confidentiality using the role-based user policy with SPHE.
引用
收藏
页码:559 / 568
页数:10
相关论文
共 31 条
  • [21] Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile
    S. Kumaresan
    Vijayaragavan Shanmugam
    The Journal of Supercomputing, 2020, 76 : 6094 - 6112
  • [22] A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
    Premkamal, Praveen Kumar
    Pasupuleti, Syam Kumar
    Alphonse, P. J. A.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (07) : 2693 - 2707
  • [23] Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage
    Wang, Shangping
    Gao, Tingting
    Zhang, Yaling
    PLOS ONE, 2018, 13 (11):
  • [24] A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
    Praveen Kumar Premkamal
    Syam Kumar Pasupuleti
    P. J. A. Alphonse
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2693 - 2707
  • [25] Ciphertext-Policy Attribute-Based Access Control with Effective User Revocation for Cloud Data Sharing System
    Vaanchig, Nyamsuren
    Chen, Wei
    Qin, Zhiguang
    2016 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD 2016), 2016, : 186 - 193
  • [26] An efficient SG-DACM framework for data integrity with user revocation in role based multiuser cloud environment
    Ambika, K.
    Moses, M. Balasingh
    COMPUTER COMMUNICATIONS, 2020, 155 : 84 - 92
  • [27] SecCloudSharing: Secure data sharing in public cloud using ciphertext-policy attribute-based proxy re-encryption with revocation
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (05)
  • [28] Implementing Secure Data Access Control for Multi-authority Cloud Storage System Using Ciphertext Policy-Attribute Based Encryption
    Lekshmi, S. Vijaya
    Revathi, M. P.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [29] Ciphertext-Policy Attribute-Based Encryption for Cloud Storage: Toward Data Privacy and Authentication in AI-Enabled IoT System
    Chinnasamy, P.
    Deepalakshmi, P.
    Dutta, Ashit Kumar
    You, Jinsang
    Joshi, Gyanendra Prasad
    MATHEMATICS, 2022, 10 (01)
  • [30] Fine-Grained Access Control for Cloud Data Sharing by Secure and Efficient Attribute-Revocable Ciphertext-Policy Attribute-Based Encryption
    Vaanchig, Nyamsuren
    Chen, Wei
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (10): : 303 - 319