Secure medical architecture on the cloud using wireless sensor networks for emergency management

被引:12
作者
Lounis, Ahmed [1 ]
Hadjidj, Abdelkrim [1 ]
Bouabdallah, Abdelmadjid [1 ]
Challal, Yacine [1 ]
机构
[1] Univ Technol Compiegne, HEUDIASYC UMR CNRS 7253, Compiegne, France
来源
2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013) | 2013年
关键词
Healthcare; Attribute based encryption; Emergency access control; Cloud computing; security;
D O I
10.1109/BWCCA.2013.142
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently introduced, Attribute-based encryption (ABE) is a promising cryptographic method proposed by Sahai and Waters. This technique provides means for designing scalable and ne-grained access control. In ABE, data are encrypted with an access structure which is the logical expression of the access policy (eg: the data can be accessed by physician in cardiology division or by nurses). The cyphertext (encrypted data) can be decrypted by any user if his secret key has attributes that satisfy the access policy. The power of ABE is that we do not need to rely on the storage server for avoiding unauthorized data access since the access policy is embedded in the cyphertext itself. This makes ABE good solution to provide a ne-grained access control for medical applications, where data is outsourced on untrusted servers like the case of the Cloud. However, for emergency management, integrating ABE creates particular challenges for providing temporary access victims medical data when this is needed. In this paper we present our architecture for secure emergency management in healthcare area. We address the challenge of ABE integrating for providing temporary access victims medical data in emergency situation. In addition, we use wireless sensor network (WSN) technology to provide early emergency detection.
引用
收藏
页码:248 / 252
页数:5
相关论文
共 11 条
[1]  
Akinyele J. A., 2011, SPSM 11, P7586
[2]   ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing [J].
Barua M. ;
Liang X. ;
Lu R. ;
Shen X. .
International Journal of Security and Networks, 2011, 6 (2-3) :67-76
[3]  
Benaloh Josh., 2009, P 2009 ACM WORKSHOP, P103, DOI DOI 10.1145/1655008.1655024
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Brucker A. D., 2010, INFORM SECURITY THEO
[6]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[7]  
Ibraimi L., 2009, "Facing Future Health Care Needs". Proceedings 2009 6th International Workshop on Wearable Micro and Nanosystems for Personalized Health (pHealth 2009), P71, DOI 10.1109/PHEALTH.2009.5754828
[8]  
Krishna T. M., 2012, ACM T AUTONOMOUS ADA
[9]   Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption [J].
Li, Ming ;
Yu, Shucheng ;
Zheng, Yao ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (01) :131-143
[10]  
Li M, 2010, L N INST COMP SCI SO, V50, P89