A Secure Framework for Ensuring EHR's Integrity using Fine-Grained Auditing and CP-ABE

被引:5
作者
Reddy, B. Eswara [1 ]
Ramu, Gandikota [1 ]
机构
[1] JNTUA Coll Engn, Dept Comp Sci & Engn, Ananthapuramu, Andhra Pradesh, India
来源
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) | 2016年
关键词
Cloud Computing; EHR's; Integrity Auditing; Security; Key Escrow;
D O I
10.1109/BigDataSecurity-HPSC-IDS.2016.32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a secured framework for storing the Electronic Health Records (EHR's) on the cloud platform without losing integrity. With the help of cloud computing, healthcare industries outsourcing their services like storing and processing of EHR's from local servers to the cloud servers. Unfortunately, Cloud Computing poses a security risk; that is EHR's integrity in the cloud server which is subjected to suspicious because of the presence of hardware/software crashes or human mistakes. Various schemes were proposed to audit cloud data integrity. However, at the time of auditing, the public auditors undoubtedly reveal the patient information. Therefore, this is a primary issue in EHR's security. To solve this problem, we introduced a secure framework, which enables the public auditor to verify EHR's without revealing patient identity. Our framework allows the auditors to audit EHR's without retrieving complete EHR files. Additionally, our framework solves the key escrow issue by using two-authority key generation scheme. Here, Key Generation Authority (KGA) and cloud server play a significant role to assign each part of the file to auditors for auditing by using Ciphertext Policy Attribute Based Encryption (CP-ABE). It allows independent auditing assignments instead of one by one.
引用
收藏
页码:85 / 89
页数:5
相关论文
共 12 条
  • [1] [Anonymous], P IEEE C COMM NETW S
  • [2] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [3] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [4] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
  • [5] Chow SSM, 2009, LECT NOTES COMPUT SC, V5443, P256
  • [6] Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
  • [7] Nan XF, 2010, IEEE INT C BIOINFORM, P520, DOI 10.1109/BIBM.2010.5706621
  • [8] Attribute-Based Encryption with Non-Monotonic Access Structures
    Ostrovsky, Rafail
    Sahai, Amit
    Waters, Brent
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 195 - +
  • [9] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
  • [10] Shacham H, 2008, LECT NOTES COMPUT SC, V5350, P90, DOI 10.1007/978-3-540-89255-7_7