A general framework for secure sharing of personal health records in cloud system

被引:40
作者
Au, Man Ho [1 ]
Yuen, Tsz Hon
Liu, Joseph K. [2 ]
Susilo, Willy [3 ]
Huang, Xinyi [4 ]
Xiang, Yang [5 ]
Jiang, Zoe L. [6 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[2] Monash Univ, Fac Informat Technol, Clayton, Vic, Australia
[3] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
[4] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou, Fujian, Peoples R China
[5] Deakin Univ, Sch Informat Technol, Geelong, Vic, Australia
[6] Harbin Inst Technol, Shenzhen Grad Sch, Sch Comp Sci & Technol, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Personal health record; Sharing; Cloud computing; ATTRIBUTE-BASED ENCRYPTION; SCHEME;
D O I
10.1016/j.jcss.2017.03.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Personal Health Record (PHR) has been developed as a promising solution that allows patient-doctors interactions in a very effective way. Cloud technology has been seen as the prominent candidate to store the sensitive medical record in PHR, but to date, the security protection provided is yet inadequate without impacting the practicality of the system. In this paper, we provide an affirmative answer to this problem by proposing a general framework for secure sharing of PHRs. Our system enables patients to securely store and share their PHR in the cloud server (for example, to their carers), and furthermore the treating doctors can refer the patients' medical record to specialists for research purposes, whenever they are required, while ensuring that the patients' information remain private. Our system also supports cross domain operations (e.g., with different countries regulations). (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:46 / 62
页数:17
相关论文
共 43 条
  • [1] [Anonymous], 2010, 2010565 CRYPT EPRINT
  • [2] [Anonymous], IACR CRYPTOLOGY EPRI
  • [3] [Anonymous], 2005, NDSS
  • [4] [Anonymous], AHIC 2010
  • [5] [Anonymous], 1996, SECURE SCHEMES SECRE
  • [6] ATTRAPADUNG N, 2015, LNCS, V9048, P87, DOI DOI 10.1007/978-3-319-16715-2_5
  • [7] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [8] Boneh D., 2001, LNCS, V2248, P514, DOI DOI 10.1007/3-540-45682-1_30
  • [9] Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
  • [10] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515