Abstract
The medical field and the health care industry generate large volumes of data that are ultimately beneficial to society. Yet, the exposure of sensitive aspects might jeopardize this data generation. Exposure to Healthcare Information made available via the internet with the intention of benefiting healthcare professionals presents a challenge for researchers in terms of privacy and security concerns. This access is intended to benefit the medical community. With growing technology, medical data on the cloud are subject to unanticipated dangers, and the threat landscape appears resilient with sensitive qualities. Organizations fail to keep their reputations and are unable to maintain public trust in our modern day. The severity of advanced security threats compromises patient data privacy and healthcare unit security. Many studies and practitioners’ fruitful approaches gave up healing resolutions, but the requirement for a perfect solution remains unsatisfactory. In this research, we provide a solution for dealing with security challenges in healthcare administration. We present a hybrid system that combines sensitive attribute access primitives with enhanced attribute-based encryption and anonymity methods. The proposed approach electronic health records design model is closely linked with the proposed approach and system scenario, forming a comprehensive blueprint for our healthcare technology solution. In terms of completion time when user instance is upto 500, the practical flexible ABE instances method outperforms the other approaches such as real-time operational data base extraction–transformation–loading, and long short-term memory to recurrent neural network by a significant margin. This method offers the quick encryption (7.5 s), decryption (5.4 s), and reduced memory usage (5361 s). A cloud sim simulator is used to evaluate the proposed mechanism’s performance, encryption, decryption, and memory usage. The latest model with better hardware and software optimization of cloud sim this method expected to perform noticeably better.
Similar content being viewed by others
Abbreviations
- EHR:
-
Electronic health records
- ABE:
-
Attribute-based encryption
- SHA:
-
Secure hash algorithm
- SADS:
-
Security authentication and data sharing
- ABAC:
-
Attribute-based access control
- RBAC:
-
Role-based access control
- IBAC:
-
Identity-based access control
- CP:
-
Cipher policy
- KP:
-
Key policy
- CSP:
-
Cloud service providers
- PACS:
-
Picture archiving communication system
- TA:
-
Trusted authority
- PUD:
-
Public domain
- PD:
-
Private domain
- GRP1, GRP2:
-
Group 1, Group 2
- \(K_M\) :
-
Master key
- \(K_P\) :
-
Public key
- \(Z_s\) :
-
Multiplicative modulo
- \(K_S\) :
-
Secret key
- PHC:
-
Physical Health Centre
- KMS:
-
Master secret key
- KP:
-
Public parameters
- GPK:
-
Private key generation
- KGP:
-
Key generation method
- CDFIP:
-
Common database forensic investigation process
- RODB:
-
Real-time operational data base
- ETL:
-
Extraction–transformation–loading
- LSTM:
-
Long short-term memory
References
(2016) A review on attribute based encryption. IEEE. https://doi.org/10.1109/CICN.2016.81.
Al-Issa Y, Ottom MA, Tamrawi A. eHealth cloud security challenges: a survey. J Healthc Eng. 2019;2019:7516035. https://doi.org/10.1155/2019/7516035.
Anitha R, Mukherjee S. Data security in cloud for health care applications. In: Jeong HY, Obaidat MS, Yen NY, Park JJ, editors. Advances in computer science and its applications. Lecture notes in electrical engineering, vol 279. Springer, Berlin, Heidelberg; 2014. https://doi.org/10.1007/978-3-642-41674-3_167.
Awan IA, Shiraz M, Hashmi MU, Shaheen Q, Akhtar R, Ditta A. Secure framework enhancing AES algorithm in cloud computing. Secur Commun Netw. 2020;2020:8863345. https://doi.org/10.1155/2020/8863345.
Azeez NA, Van der Vyver C. Security and privacy issues in e-health cloud-based system: a comprehensive content analysis. Egypt Inform J. 2019;20(2):97–108.
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP '07), Berkeley, CA, USA. 2007. p. 321–34. https://doi.org/10.1109/SP.2007.11.
Campbell RJ. Database design: what him professionals need to know. In: American Health Information Management Association: Perspectives In Health Information Management/AHIMA; 2004. p. 1.
Chase M. Multi-authority attribute based encryption. In: Vadhan SP, editor. Theory of cryptography. Berlin: Springer; 2007. p. 515–34.
Chase M, Chow SS. Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM conference on computer and communications security, CCS ’09. New York: Association for Computing Machinery; 2009, p. 121–30. https://doi.org/10.1145/1653662.1653678.
Chen SW, Chiang DL, Liu CH, et al. Confidentiality protection of digital health records in cloud computing. J Med Syst. 2016;40(5):1–12.
Chenthara S, Ahmed K, Wang H, et al. Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access. 2019;7:74361–82.
Florence ML, Suresh D. Enhanced secure sharing of phr’s in cloud using user usage based attribute based encryption and signature with keyword search. Clust Comput. 2019;22(6):13119–30. https://doi.org/10.1007/s10586-017-1276-7.
Glasberg R, Hartmann M, Draheim M, Tamm G, Hessel F. Risks and crises for healthcare providers: the impact of cloud computing. Sci World J. 2014;2014:524659. https://doi.org/10.1155/2014/524659.
Gowda BK, Sumathi R. Hierarchy attribute-based encryption with timing enabled privacy preserving keyword search mechanism for e-health clouds. In: 2017 2nd IEEE international conference on recent trends in electronics, information and communication technology (RTEICT). 2017. p. 425–29. https://doi.org/10.1109/RTEICT.2017.8256632.
Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS ’06. New York: Association for Computing Machinery. 2006, p. 89–98. https://doi.org/10.1145/1180405.1180418.
Haraty RA, Zbib M, Masud M. Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems. Peer-to-Peer Netw Appl. 2016;9(5):812–23.
Haufe K, Dzombeta S, Brandis K. Proposal for a security management in cloud computing for health care. Sci World J. 2014;2014:146970. https://doi.org/10.1155/2014/146970.
Jung T, Li XY, Wan Z, et al. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans Inf Forensics Secur. 2014;10(1):190–9.
Kamalakannan E, Arvind K. Privacy conserving and secure distribution of personal health information using cloud. In: International conference on information communication and embedded systems (ICICES2014). IEEE; 2014. p. 1–4.
Kumar J, Goomer R, Singh AK. Long short term memory recurrent neural network (lstm-rnn) based workload forecasting model for cloud datacenters. Procedia Comput Sci. 2018;125:676–82.
Lewko A, Waters B. Decentralizing attribute-based encryption. In: Paterson KG, editor. Advances in cryptology—EUROCRYPT 2011. Berlin: Springer; 2011. p. 568–88.
Lewko A, Waters B. Unbounded hibe and attribute-based encryption. In: Paterson KG, editor. Advances in cryptology—EUROCRYPT 2011. Berlin: Springer; 2011. p. 547–67.
Lewko A, Waters B. New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Safavi-Naini R, Canetti R, editors. Advances in cryptology–CRYPTO 2012. Berlin: Springer; 2012. p. 180–98.
Lewko A, Okamoto T, Sahai A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H, editor., et al., Advances in cryptology—EUROCRYPT 2010. Berlin Heidelberg, Berlin, Heidelberg: Springer; 2010. p. 62–91.
Li Q, Zhu H, Xiong J, et al. Fine-grained multi-authority access control in iot-enabled mhealth. Ann Telecommun. 2019;74(7):389–400. https://doi.org/10.1007/s12243-018-00702-6.
Liu S, Tang H (2021) A consortium medical blockchain data storage and sharing model based on ipfs. In: 2021 The 4th international conference on computers in management and business, ICCMB 2021. New York: Association for Computing Machinery. p. 147–53. https://doi.org/10.1145/3450588.3450944.
Liu W, Liu X, Liu J, et al. Auditing and revocation enabled role-based access control over outsourced private ehrs. In: 2015 IEEE 17th international conference on high performance computing and communications, 2015 IEEE 7th international symposium on cyberspace safety and security, and 2015 IEEE 12th international conference on embedded software and systems. IEEE; 2015. p. 336–41.
Liu X, Yang X, Luo Y, et al. Anonymous electronic health record sharing scheme based on decentralized hierarchical attribute-based encryption in cloud environment. IEEE Access. 2020;8:200180–93. https://doi.org/10.1109/ACCESS.2020.3035468.
Mashima D, Ahamad M. Enhancing accountability of electronic health record usage via patient-centric monitoring. In: Proceedings of the 2nd ACM SIGHIT international health informatics symposium (IHI '12). Association for computing machinery, New York, NY, USA. 2019; p. 409–18. https://doi.org/10.1145/2110363.2110410.
Masood I, Wang Y, Daud Aljohani NR, Dawood H. Towards smart healthcare: patient data privacy and security in sensor-cloud infrastructure. Wireless Commun Mob Comput. 2018;2018:2143897. https://doi.org/10.1155/2018/2143897.
Masud M, Gaba GS, Choudhary K, et al. A robust and lightweight secure access scheme for cloud based e-healthcare services. Peer-to-peer Netw Appl. 2021;14(5):3043–57.
Menon MS, et al. A hybrid framework for drug response similarity opting machine learning approach. Turk J Comput Math Educ (TURCOMAT). 2021;12(11):550–8.
Misaki E, Apiola M, Gaiani S. Technology for agriculture: information channels for decision making in chamwino, tanzania. In: 2015 IEEE International conference on engineering, technology and innovation/international technology management conference (ICE/ITMC). IEEE; 2015. p. 1–8.
Narayanan U, Paul V, Joseph S. A novel system architecture for secure authentication and data sharing in cloud enabled big data environment. J King Saud Univ Comput Inf Sci. 2020;34:3121–35.
Praveen K, Alphonse PJA. Attribute based encryption in cloud computing: a survey, gap analysis, and future directions. J Netw Comput Appl. 2018;108:37–52.
Porwal S, Mittal S. Implementation of ciphertext policy-attribute based encryption (cp-abe) for fine grained access control of university data. In: 2017 tenth international conference on contemporary computing (IC3), 2017. p. 1–7. https://doi.org/10.1109/IC3.2017.8284289.
Qiao Z, Liang S, Davis S, et al. Survey of attribute based encryption. In: 15th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). 2014. p. 1–6. https://doi.org/10.1109/SNPD.2014.6888687.
Qin B, Deng H, Wu Q, et al. Flexible attribute-based encryption applicable to secure e-healthcare records. Int J Inf Secur. 2015;14(6):499–511. https://doi.org/10.1007/s10207-014-0272-7.
Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, editor. Advances in cryptology—EUROCRYPT 2005. Berlin: Springer; 2005. p. 457–73.
Sangeetha D, Vaidehi V. A secure cloud based personal health record framework for a multi owner environment. Ann Telecommun. 2017;72(1):95–104. https://doi.org/10.1007/s12243-016-0529-4.
Sangeetha D, Chakkaravarthy SS, Satapathy SC, et al. Multi keyword searchable attribute based encryption for efficient retrieval of health records in cloud. Multimed Tools Appl. 2022;81(16):22065–85. https://doi.org/10.1007/s11042-021-10817-z.
Saran P, Rajesh D, Pamnani H, et al. A survey on health care facilities by cloud computing. In: 2020 international conference on emerging trends in information technology and engineering (ic-ETITE). IEEE; 2020. p. 1–5.
Singh I, Kumar D, Khatri SK. Improving the efficiency of e-healthcare system based on cloud. In: 2019 amity international conference on artificial intelligence (AICAI). IEEE; 2019. p. 930–33.
Soceanu A, Vasylenko M, Egner A, et al. Managing the privacy and security of ehealth data. In: 2015 20th international conference on control systems and computer science. IEEE; 2015. p. 439–46.
Sowjanya K, Dasgupta M. A ciphertext-policy attribute based encryption scheme for wireless body area networks based on ecc. J Inf Secur Appl. 2020;54(102):559. https://doi.org/10.1016/j.jisa.2020.102559.
Sun PJ. Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access. 2019;7:147420–52.
Walid R, Joshi KP, Geol Choi S, et al. Cloud-based encrypted ehr system with semantically rich access control and searchable encryption. In: 2020 IEEE international conference on big data (Big Data). 2020. p. 4075–4082. https://doi.org/10.1109/BigData50022.2020.9378002.
Yuan E, Tong J. Attributed based access control (abac) for web services. In: IEEE international conference on web services (ICWS’05). IEEE. 2005.
Zala K, Madhu S. A novel approach to privacy preservation on e-healthcare data in a cloud environment. In: Smart trends in computing and communications, vol. 396. Springer; 2023. p. 149–57.
Zala K, Thakkar HK, Jadeja R, et al. Prms: design and development of patients’ e-healthcare records management system for privacy preservation in third party cloud platforms. IEEE Access. 2022;10:85777–91.
Zhang L, Wu Q, Mu Y, et al. Privacy-preserving and secure sharing of phr in the cloud. J Med Syst. 2016;40(12):267. https://doi.org/10.1007/s10916-016-0595-1.
Zhang L, Ye Y, Mu Y. Multiauthority access control with anonymous authentication for personal health record. IEEE Internet Things J. 2021;8(1):156–67. https://doi.org/10.1109/JIOT.2020.3000775.
Zhiqiang G, Lingsong H, Hang T, et al. A cloud computing based mobile healthcare service system. In: 2015 IEEE 3rd international conference on smart instrumentation. IEEE: measurement and applications (ICSIMA); 2015. p. 1–6.
Acknowledgements
This work did not receive any external funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors state that there is no bias in their work. The authors who have their names appear below attest that they have no conflicts of interest, either financial (such as honoraria, educational grants, participation in speaker’s bureaus, membership, employment, consultancies, stock ownership, or other equity interest) or non-financial (such as personal or professional relationships, affiliations, knowledge) with any organization or entity.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zala, K., Thakkar, H.K., Dholakia, N. et al. Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health. SN COMPUT. SCI. 5, 203 (2024). https://doi.org/10.1007/s42979-023-02541-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-023-02541-2