RETRACTED: E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption (Retracted Article)

被引:16
作者
Deepa, N. [1 ]
Pandiaraja, P. [1 ]
机构
[1] M Kumarasamy Coll Engn, Dept Comp Sci & Engn, Karur 639113, Tamil Nadu, India
关键词
Computation complexity; Communication complexity; Attributes; Privacy; Cloud computing; Attacks; Key computation; Index building; PROXY RE-ENCRYPTION; ACCESS-CONTROL; SECURE;
D O I
10.1007/s12652-020-01911-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
File storing and retrieving is performed in the robust as well as secure manner by using the cloud computing technology. Various researchers have developed numerous mechanisms via attribute based encryption for the health care applications. Although, more protocols developed among them only very few techniques were efficient and robust for the quick retrieval of reports from the cloud but many protocols suffer by reason of less security, confidentiality and integrity. Existing techniques was based on encrypting the file based on the keyword. But in our proposed protocol, we have developed an attribute based encryption which will overcome the issues faced by the previous research techniques. The group of patient records are encrypted with single common attribute. From the survey, it is clear that the existing protocols suffer due to high computation and communication complexity. So as to rectify the existing issue, we proposed the effective recovery of files by using attribute based file encryption mechanism from cloud (ERFC). When comparing to the existing protocols, our proposed ERFC mechanism takes minimum computation and communication complexity for four working mechanisms namely, patient key computation, doctor index building computation, cloud working mechanism and finally patient report decryption. All these four working mechanisms are developed for effective recovery of files to the end users. Our proposed protocol is secure against some attacks like Eavesdropping, masquerade, replay and man in the middle attack. Our performance analysis section describes that our ERFC mechanism is better with communication as well as computation complexity when related to the other existing protocols.
引用
收藏
页码:4877 / 4887
页数:11
相关论文
共 40 条
[1]  
[Anonymous], 2014, INFORM COMMUNICATION
[2]  
[Anonymous], 2013, WUHAN UNIV J NAT SCI, DOI DOI 10.1007/s11859-013-0925-9
[3]   An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption [J].
Balu, A. ;
Kuppusamy, K. .
INFORMATION SCIENCES, 2014, 276 :354-362
[4]   Security Concerns in Popular Cloud Storage Services [J].
Chu, Cheng-Kang ;
Zhu, Wen-Tao ;
Han, Jin ;
Liu, Joseph K. ;
Xu, Jia ;
Zhou, Jianying .
IEEE PERVASIVE COMPUTING, 2013, 12 (04) :50-57
[5]   An extensive review and possible attack on the privacy preserving ranked multi-keyword search for multiple data owners in cloud computing [J].
Deepa, N. ;
Vijayakumar, P. ;
Rawal, Bharat S. ;
Balamurugan, B. .
2017 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2017, :149-154
[6]  
Deepa N, 2019, SOFTCOMPUT J, V20, P20
[7]   Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts [J].
Deng, Hua ;
Wu, Qianhong ;
Qin, Bo ;
Domingo-Ferrer, Josep ;
Zhang, Lei ;
Liu, Jianwei ;
Shi, Wenchang .
INFORMATION SCIENCES, 2014, 275 :370-384
[8]   Arbitrary-State Attribute-Based Encryption with Dynamic Membership [J].
Fan, Chun-I ;
Huang, Vincent Shi-Ming ;
Ruan, He-Ming .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (08) :1951-1961
[9]   Hierarchical ID-based cryptography [J].
Gentry, C ;
Silverberg, A .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 :548-566
[10]  
Green M., 2011, USENIX Security Symposium