Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The medical field and the health care industry generate large volumes of data that are ultimately beneficial to society. Yet, the exposure of sensitive aspects might jeopardize this data generation. Exposure to Healthcare Information made available via the internet with the intention of benefiting healthcare professionals presents a challenge for researchers in terms of privacy and security concerns. This access is intended to benefit the medical community. With growing technology, medical data on the cloud are subject to unanticipated dangers, and the threat landscape appears resilient with sensitive qualities. Organizations fail to keep their reputations and are unable to maintain public trust in our modern day. The severity of advanced security threats compromises patient data privacy and healthcare unit security. Many studies and practitioners’ fruitful approaches gave up healing resolutions, but the requirement for a perfect solution remains unsatisfactory. In this research, we provide a solution for dealing with security challenges in healthcare administration. We present a hybrid system that combines sensitive attribute access primitives with enhanced attribute-based encryption and anonymity methods. The proposed approach electronic health records design model is closely linked with the proposed approach and system scenario, forming a comprehensive blueprint for our healthcare technology solution. In terms of completion time when user instance is upto 500, the practical flexible ABE instances method outperforms the other approaches such as real-time operational data base extraction–transformation–loading, and long short-term memory to recurrent neural network by a significant margin. This method offers the quick encryption (7.5 s), decryption (5.4 s), and reduced memory usage (5361 s). A cloud sim simulator is used to evaluate the proposed mechanism’s performance, encryption, decryption, and memory usage. The latest model with better hardware and software optimization of cloud sim this method expected to perform noticeably better.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Algorithm 1
Algorithm 2
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Abbreviations

EHR:

Electronic health records

ABE:

Attribute-based encryption

SHA:

Secure hash algorithm

SADS:

Security authentication and data sharing

ABAC:

Attribute-based access control

RBAC:

Role-based access control

IBAC:

Identity-based access control

CP:

Cipher policy

KP:

Key policy

CSP:

Cloud service providers

PACS:

Picture archiving communication system

TA:

Trusted authority

PUD:

Public domain

PD:

Private domain

GRP1, GRP2:

Group 1, Group 2

\(K_M\) :

Master key

\(K_P\) :

Public key

\(Z_s\) :

Multiplicative modulo

\(K_S\) :

Secret key

PHC:

Physical Health Centre

KMS:

Master secret key

KP:

Public parameters

GPK:

Private key generation

KGP:

Key generation method

CDFIP:

Common database forensic investigation process

RODB:

Real-time operational data base

ETL:

Extraction–transformation–loading

LSTM:

Long short-term memory

References

  1. (2016) A review on attribute based encryption. IEEE. https://doi.org/10.1109/CICN.2016.81.

  2. Al-Issa Y, Ottom MA, Tamrawi A. eHealth cloud security challenges: a survey. J Healthc Eng. 2019;2019:7516035. https://doi.org/10.1155/2019/7516035.

    Article  Google Scholar 

  3. Anitha R, Mukherjee S. Data security in cloud for health care applications. In: Jeong HY, Obaidat MS, Yen NY, Park JJ, editors. Advances in computer science and its applications. Lecture notes in electrical engineering, vol 279. Springer, Berlin, Heidelberg; 2014. https://doi.org/10.1007/978-3-642-41674-3_167.

  4. Awan IA, Shiraz M, Hashmi MU, Shaheen Q, Akhtar R, Ditta A. Secure framework enhancing AES algorithm in cloud computing. Secur Commun Netw. 2020;2020:8863345. https://doi.org/10.1155/2020/8863345.

    Article  Google Scholar 

  5. Azeez NA, Van der Vyver C. Security and privacy issues in e-health cloud-based system: a comprehensive content analysis. Egypt Inform J. 2019;20(2):97–108.

    Article  Google Scholar 

  6. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP '07), Berkeley, CA, USA. 2007. p. 321–34. https://doi.org/10.1109/SP.2007.11.

  7. Campbell RJ. Database design: what him professionals need to know. In: American Health Information Management Association: Perspectives In Health Information Management/AHIMA; 2004. p. 1.

  8. Chase M. Multi-authority attribute based encryption. In: Vadhan SP, editor. Theory of cryptography. Berlin: Springer; 2007. p. 515–34.

    Chapter  Google Scholar 

  9. Chase M, Chow SS. Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM conference on computer and communications security, CCS ’09. New York: Association for Computing Machinery; 2009, p. 121–30. https://doi.org/10.1145/1653662.1653678.

  10. Chen SW, Chiang DL, Liu CH, et al. Confidentiality protection of digital health records in cloud computing. J Med Syst. 2016;40(5):1–12.

    Article  Google Scholar 

  11. Chenthara S, Ahmed K, Wang H, et al. Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access. 2019;7:74361–82.

    Article  Google Scholar 

  12. Florence ML, Suresh D. Enhanced secure sharing of phr’s in cloud using user usage based attribute based encryption and signature with keyword search. Clust Comput. 2019;22(6):13119–30. https://doi.org/10.1007/s10586-017-1276-7.

    Article  Google Scholar 

  13. Glasberg R, Hartmann M, Draheim M, Tamm G, Hessel F. Risks and crises for healthcare providers: the impact of cloud computing. Sci World J. 2014;2014:524659. https://doi.org/10.1155/2014/524659.

    Article  Google Scholar 

  14. Gowda BK, Sumathi R. Hierarchy attribute-based encryption with timing enabled privacy preserving keyword search mechanism for e-health clouds. In: 2017 2nd IEEE international conference on recent trends in electronics, information and communication technology (RTEICT). 2017. p. 425–29. https://doi.org/10.1109/RTEICT.2017.8256632.

  15. Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS ’06. New York: Association for Computing Machinery. 2006, p. 89–98. https://doi.org/10.1145/1180405.1180418.

  16. Haraty RA, Zbib M, Masud M. Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems. Peer-to-Peer Netw Appl. 2016;9(5):812–23.

    Article  Google Scholar 

  17. Haufe K, Dzombeta S, Brandis K. Proposal for a security management in cloud computing for health care. Sci World J. 2014;2014:146970. https://doi.org/10.1155/2014/146970.

    Article  Google Scholar 

  18. Jung T, Li XY, Wan Z, et al. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans Inf Forensics Secur. 2014;10(1):190–9.

    Article  Google Scholar 

  19. Kamalakannan E, Arvind K. Privacy conserving and secure distribution of personal health information using cloud. In: International conference on information communication and embedded systems (ICICES2014). IEEE; 2014. p. 1–4.

  20. Kumar J, Goomer R, Singh AK. Long short term memory recurrent neural network (lstm-rnn) based workload forecasting model for cloud datacenters. Procedia Comput Sci. 2018;125:676–82.

    Article  Google Scholar 

  21. Lewko A, Waters B. Decentralizing attribute-based encryption. In: Paterson KG, editor. Advances in cryptology—EUROCRYPT 2011. Berlin: Springer; 2011. p. 568–88.

    Chapter  Google Scholar 

  22. Lewko A, Waters B. Unbounded hibe and attribute-based encryption. In: Paterson KG, editor. Advances in cryptology—EUROCRYPT 2011. Berlin: Springer; 2011. p. 547–67.

    Chapter  Google Scholar 

  23. Lewko A, Waters B. New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Safavi-Naini R, Canetti R, editors. Advances in cryptology–CRYPTO 2012. Berlin: Springer; 2012. p. 180–98.

    Chapter  Google Scholar 

  24. Lewko A, Okamoto T, Sahai A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H, editor., et al., Advances in cryptology—EUROCRYPT 2010. Berlin Heidelberg, Berlin, Heidelberg: Springer; 2010. p. 62–91.

    Chapter  Google Scholar 

  25. Li Q, Zhu H, Xiong J, et al. Fine-grained multi-authority access control in iot-enabled mhealth. Ann Telecommun. 2019;74(7):389–400. https://doi.org/10.1007/s12243-018-00702-6.

    Article  Google Scholar 

  26. Liu S, Tang H (2021) A consortium medical blockchain data storage and sharing model based on ipfs. In: 2021 The 4th international conference on computers in management and business, ICCMB 2021. New York: Association for Computing Machinery. p. 147–53. https://doi.org/10.1145/3450588.3450944.

  27. Liu W, Liu X, Liu J, et al. Auditing and revocation enabled role-based access control over outsourced private ehrs. In: 2015 IEEE 17th international conference on high performance computing and communications, 2015 IEEE 7th international symposium on cyberspace safety and security, and 2015 IEEE 12th international conference on embedded software and systems. IEEE; 2015. p. 336–41.

  28. Liu X, Yang X, Luo Y, et al. Anonymous electronic health record sharing scheme based on decentralized hierarchical attribute-based encryption in cloud environment. IEEE Access. 2020;8:200180–93. https://doi.org/10.1109/ACCESS.2020.3035468.

    Article  Google Scholar 

  29. Mashima D, Ahamad M. Enhancing accountability of electronic health record usage via patient-centric monitoring. In: Proceedings of the 2nd ACM SIGHIT international health informatics symposium (IHI '12). Association for computing machinery, New York, NY, USA. 2019; p. 409–18. https://doi.org/10.1145/2110363.2110410.

  30. Masood I, Wang Y, Daud Aljohani NR, Dawood H. Towards smart healthcare: patient data privacy and security in sensor-cloud infrastructure. Wireless Commun Mob Comput. 2018;2018:2143897. https://doi.org/10.1155/2018/2143897.

    Article  Google Scholar 

  31. Masud M, Gaba GS, Choudhary K, et al. A robust and lightweight secure access scheme for cloud based e-healthcare services. Peer-to-peer Netw Appl. 2021;14(5):3043–57.

    Article  Google Scholar 

  32. Menon MS, et al. A hybrid framework for drug response similarity opting machine learning approach. Turk J Comput Math Educ (TURCOMAT). 2021;12(11):550–8.

    Article  Google Scholar 

  33. Misaki E, Apiola M, Gaiani S. Technology for agriculture: information channels for decision making in chamwino, tanzania. In: 2015 IEEE International conference on engineering, technology and innovation/international technology management conference (ICE/ITMC). IEEE; 2015. p. 1–8.

  34. Narayanan U, Paul V, Joseph S. A novel system architecture for secure authentication and data sharing in cloud enabled big data environment. J King Saud Univ Comput Inf Sci. 2020;34:3121–35.

    Google Scholar 

  35. Praveen K, Alphonse PJA. Attribute based encryption in cloud computing: a survey, gap analysis, and future directions. J Netw Comput Appl. 2018;108:37–52.

    Article  Google Scholar 

  36. Porwal S, Mittal S. Implementation of ciphertext policy-attribute based encryption (cp-abe) for fine grained access control of university data. In: 2017 tenth international conference on contemporary computing (IC3), 2017. p. 1–7. https://doi.org/10.1109/IC3.2017.8284289.

  37. Qiao Z, Liang S, Davis S, et al. Survey of attribute based encryption. In: 15th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). 2014. p. 1–6. https://doi.org/10.1109/SNPD.2014.6888687.

  38. Qin B, Deng H, Wu Q, et al. Flexible attribute-based encryption applicable to secure e-healthcare records. Int J Inf Secur. 2015;14(6):499–511. https://doi.org/10.1007/s10207-014-0272-7.

    Article  Google Scholar 

  39. Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, editor. Advances in cryptology—EUROCRYPT 2005. Berlin: Springer; 2005. p. 457–73.

    Chapter  Google Scholar 

  40. Sangeetha D, Vaidehi V. A secure cloud based personal health record framework for a multi owner environment. Ann Telecommun. 2017;72(1):95–104. https://doi.org/10.1007/s12243-016-0529-4.

    Article  Google Scholar 

  41. Sangeetha D, Chakkaravarthy SS, Satapathy SC, et al. Multi keyword searchable attribute based encryption for efficient retrieval of health records in cloud. Multimed Tools Appl. 2022;81(16):22065–85. https://doi.org/10.1007/s11042-021-10817-z.

    Article  Google Scholar 

  42. Saran P, Rajesh D, Pamnani H, et al. A survey on health care facilities by cloud computing. In: 2020 international conference on emerging trends in information technology and engineering (ic-ETITE). IEEE; 2020. p. 1–5.

  43. Singh I, Kumar D, Khatri SK. Improving the efficiency of e-healthcare system based on cloud. In: 2019 amity international conference on artificial intelligence (AICAI). IEEE; 2019. p. 930–33.

  44. Soceanu A, Vasylenko M, Egner A, et al. Managing the privacy and security of ehealth data. In: 2015 20th international conference on control systems and computer science. IEEE; 2015. p. 439–46.

  45. Sowjanya K, Dasgupta M. A ciphertext-policy attribute based encryption scheme for wireless body area networks based on ecc. J Inf Secur Appl. 2020;54(102):559. https://doi.org/10.1016/j.jisa.2020.102559.

    Article  Google Scholar 

  46. Sun PJ. Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access. 2019;7:147420–52.

    Article  Google Scholar 

  47. Walid R, Joshi KP, Geol Choi S, et al. Cloud-based encrypted ehr system with semantically rich access control and searchable encryption. In: 2020 IEEE international conference on big data (Big Data). 2020. p. 4075–4082. https://doi.org/10.1109/BigData50022.2020.9378002.

  48. Yuan E, Tong J. Attributed based access control (abac) for web services. In: IEEE international conference on web services (ICWS’05). IEEE. 2005.

  49. Zala K, Madhu S. A novel approach to privacy preservation on e-healthcare data in a cloud environment. In: Smart trends in computing and communications, vol. 396. Springer; 2023. p. 149–57.

  50. Zala K, Thakkar HK, Jadeja R, et al. Prms: design and development of patients’ e-healthcare records management system for privacy preservation in third party cloud platforms. IEEE Access. 2022;10:85777–91.

    Article  Google Scholar 

  51. Zhang L, Wu Q, Mu Y, et al. Privacy-preserving and secure sharing of phr in the cloud. J Med Syst. 2016;40(12):267. https://doi.org/10.1007/s10916-016-0595-1.

    Article  Google Scholar 

  52. Zhang L, Ye Y, Mu Y. Multiauthority access control with anonymous authentication for personal health record. IEEE Internet Things J. 2021;8(1):156–67. https://doi.org/10.1109/JIOT.2020.3000775.

    Article  Google Scholar 

  53. Zhiqiang G, Lingsong H, Hang T, et al. A cloud computing based mobile healthcare service system. In: 2015 IEEE 3rd international conference on smart instrumentation. IEEE: measurement and applications (ICSIMA); 2015. p. 1–6.

Download references

Acknowledgements

This work did not receive any external funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hiren Kumar Thakkar.

Ethics declarations

Conflict of interest

The authors state that there is no bias in their work. The authors who have their names appear below attest that they have no conflicts of interest, either financial (such as honoraria, educational grants, participation in speaker’s bureaus, membership, employment, consultancies, stock ownership, or other equity interest) or non-financial (such as personal or professional relationships, affiliations, knowledge) with any organization or entity.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zala, K., Thakkar, H.K., Dholakia, N. et al. Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health. SN COMPUT. SCI. 5, 203 (2024). https://doi.org/10.1007/s42979-023-02541-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02541-2

Keywords

Navigation