RETRACTED: E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption (Retracted Article)

被引:16
作者
Deepa, N. [1 ]
Pandiaraja, P. [1 ]
机构
[1] M Kumarasamy Coll Engn, Dept Comp Sci & Engn, Karur 639113, Tamil Nadu, India
关键词
Computation complexity; Communication complexity; Attributes; Privacy; Cloud computing; Attacks; Key computation; Index building; PROXY RE-ENCRYPTION; ACCESS-CONTROL; SECURE;
D O I
10.1007/s12652-020-01911-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
File storing and retrieving is performed in the robust as well as secure manner by using the cloud computing technology. Various researchers have developed numerous mechanisms via attribute based encryption for the health care applications. Although, more protocols developed among them only very few techniques were efficient and robust for the quick retrieval of reports from the cloud but many protocols suffer by reason of less security, confidentiality and integrity. Existing techniques was based on encrypting the file based on the keyword. But in our proposed protocol, we have developed an attribute based encryption which will overcome the issues faced by the previous research techniques. The group of patient records are encrypted with single common attribute. From the survey, it is clear that the existing protocols suffer due to high computation and communication complexity. So as to rectify the existing issue, we proposed the effective recovery of files by using attribute based file encryption mechanism from cloud (ERFC). When comparing to the existing protocols, our proposed ERFC mechanism takes minimum computation and communication complexity for four working mechanisms namely, patient key computation, doctor index building computation, cloud working mechanism and finally patient report decryption. All these four working mechanisms are developed for effective recovery of files to the end users. Our proposed protocol is secure against some attacks like Eavesdropping, masquerade, replay and man in the middle attack. Our performance analysis section describes that our ERFC mechanism is better with communication as well as computation complexity when related to the other existing protocols.
引用
收藏
页码:4877 / 4887
页数:11
相关论文
共 40 条
[31]  
Xie XX, 2013, J UNIVERS COMPUT SCI, V19, P2349
[32]  
Ximeng Liu, 2014, International Journal of Network Security, V16, P437
[33]   Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing [J].
Xiong, Hu ;
Zhang, Hao ;
Sun, Jianfei .
IEEE SYSTEMS JOURNAL, 2019, 13 (03) :2739-2750
[34]   Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage [J].
Xue, Kaiping ;
Chen, Weikeng ;
Li, Wei ;
Hong, Jianan ;
Hong, Peilin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) :2062-2074
[35]   Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data [J].
Yang, Yanjiang ;
Liu, Joseph K. ;
Liang, Kaitai ;
Choo, Kim-Kwang Raymond ;
Zhou, Jianying .
COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 :146-166
[36]  
Yuen TH, 2014, LECT NOTES COMPUT SC, V8712, P130, DOI 10.1007/978-3-319-11203-9_8
[37]   Context-aware pseudonymization and authorization model for IoT-based smart hospitals [J].
Zemmoudj, Salah ;
Bermad, Nabila ;
Omar, Mawloud .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (11) :4473-4490
[38]   Privacy-Preserving and Dynamic Multi-Attribute Conjunctive Keyword Search Over Encrypted Cloud Data [J].
Zhang, Lili ;
Zhang, Yuqing ;
Ma, Hua .
IEEE ACCESS, 2018, 6 :34214-34225
[39]   A framework for protecting personal information and privacy [J].
Zheng, Hongying ;
Yuan, Quan ;
Chen, Jianyong .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) :2867-2874
[40]  
Zhu WL, 2014, CHINESE J ELECTRON, V23, P778