Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health

Published: 13 January 2024 Publication History

Abstract

The medical field and the health care industry generate large volumes of data that are ultimately beneficial to society. Yet, the exposure of sensitive aspects might jeopardize this data generation. Exposure to Healthcare Information made available via the internet with the intention of benefiting healthcare professionals presents a challenge for researchers in terms of privacy and security concerns. This access is intended to benefit the medical community. With growing technology, medical data on the cloud are subject to unanticipated dangers, and the threat landscape appears resilient with sensitive qualities. Organizations fail to keep their reputations and are unable to maintain public trust in our modern day. The severity of advanced security threats compromises patient data privacy and healthcare unit security. Many studies and practitioners’ fruitful approaches gave up healing resolutions, but the requirement for a perfect solution remains unsatisfactory. In this research, we provide a solution for dealing with security challenges in healthcare administration. We present a hybrid system that combines sensitive attribute access primitives with enhanced attribute-based encryption and anonymity methods. The proposed approach electronic health records design model is closely linked with the proposed approach and system scenario, forming a comprehensive blueprint for our healthcare technology solution. In terms of completion time when user instance is upto 500, the practical flexible ABE instances method outperforms the other approaches such as real-time operational data base extraction–transformation–loading, and long short-term memory to recurrent neural network by a significant margin. This method offers the quick encryption (7.5 s), decryption (5.4 s), and reduced memory usage (5361 s). A cloud sim simulator is used to evaluate the proposed mechanism’s performance, encryption, decryption, and memory usage. The latest model with better hardware and software optimization of cloud sim this method expected to perform noticeably better.

References

[1]
(2016) A review on attribute based encryption. IEEE.
[2]
Al-Issa Y, Ottom MA, and Tamrawi A eHealth Cloud Security Challenges: A Survey J Healthc Eng 2019 2019 7516035
[3]
Anitha R, Mukherjee S. Data security in cloud for health care applications. In: Jeong HY, Obaidat MS, Yen NY, Park JJ, editors. Advances in computer science and its applications. Lecture notes in electrical engineering, vol 279. Springer, Berlin, Heidelberg; 2014.
[4]
Awan IA, Shiraz M, Hashmi MU, Shaheen Q, Akhtar R, and Ditta A Secure framework enhancing AES algorithm in cloud computing Secur Commun Netw. 2020 2020 8863345
[5]
Azeez NA and Van der Vyver C Security and privacy issues in e-health cloud-based system: a comprehensive content analysis Egypt Inform J 2019 20 2 97-108
[6]
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP '07), Berkeley, CA, USA. 2007. p. 321–34.
[7]
Campbell RJ. Database design: what him professionals need to know. In: American Health Information Management Association: Perspectives In Health Information Management/AHIMA; 2004. p. 1.
[8]
Chase M Vadhan SP Multi-authority attribute based encryption Theory of cryptography 2007 Berlin Springer 515-534
[9]
Chase M, Chow SS. Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM conference on computer and communications security, CCS ’09. New York: Association for Computing Machinery; 2009, p. 121–30.
[10]
Chen SW, Chiang DL, Liu CH, et al. Confidentiality protection of digital health records in cloud computing J Med Syst 2016 40 5 1-12
[11]
Chenthara S, Ahmed K, Wang H, et al. Security and privacy-preserving challenges of e-health solutions in cloud computing IEEE Access 2019 7 74361-74382
[12]
Florence ML and Suresh D Enhanced secure sharing of phr’s in cloud using user usage based attribute based encryption and signature with keyword search Clust Comput 2019 22 6 13119-13130
[13]
Glasberg R, Hartmann M, Draheim M, Tamm G, and Hessel F Risks and crises for healthcare providers: the impact of cloud computing Sci World J. 2014 2014
[14]
Gowda BK, Sumathi R. Hierarchy attribute-based encryption with timing enabled privacy preserving keyword search mechanism for e-health clouds. In: 2017 2nd IEEE international conference on recent trends in electronics, information and communication technology (RTEICT). 2017. p. 425–29.
[15]
Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS ’06. New York: Association for Computing Machinery. 2006, p. 89–98.
[16]
Haraty RA, Zbib M, and Masud M Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems Peer-to-Peer Netw Appl 2016 9 5 812-823
[17]
Haufe K, Dzombeta S, and Brandis K Proposal for a security management in cloud computing for health care Sci World J 2014 2014
[18]
Jung T, Li XY, Wan Z, et al. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption IEEE Trans Inf Forensics Secur 2014 10 1 190-199
[19]
Kamalakannan E, Arvind K. Privacy conserving and secure distribution of personal health information using cloud. In: International conference on information communication and embedded systems (ICICES2014). IEEE; 2014. p. 1–4.
[20]
Kumar J, Goomer R, and Singh AK Long short term memory recurrent neural network (lstm-rnn) based workload forecasting model for cloud datacenters Procedia Comput Sci 2018 125 676-682
[21]
Lewko A and Waters B Paterson KG Decentralizing attribute-based encryption Advances in cryptology—EUROCRYPT 2011 2011 Berlin Springer 568-588
[22]
Lewko A and Waters B Paterson KG Unbounded hibe and attribute-based encryption Advances in cryptology—EUROCRYPT 2011 2011 Berlin Springer 547-567
[23]
Lewko A and Waters B Safavi-Naini R and Canetti R New proof methods for attribute-based encryption: achieving full security through selective techniques Advances in cryptology–CRYPTO 2012 2012 Berlin Springer 180-198
[24]
Lewko A, Okamoto T, Sahai A, et al. Gilbert H et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption Advances in cryptology—EUROCRYPT 2010 2010 Berlin Heidelberg, Berlin, Heidelberg Springer 62-91
[25]
Li Q, Zhu H, Xiong J, et al. Fine-grained multi-authority access control in iot-enabled mhealth Ann Telecommun 2019 74 7 389-400
[26]
Liu S, Tang H (2021) A consortium medical blockchain data storage and sharing model based on ipfs. In: 2021 The 4th international conference on computers in management and business, ICCMB 2021. New York: Association for Computing Machinery. p. 147–53.
[27]
Liu W, Liu X, Liu J, et al. Auditing and revocation enabled role-based access control over outsourced private ehrs. In: 2015 IEEE 17th international conference on high performance computing and communications, 2015 IEEE 7th international symposium on cyberspace safety and security, and 2015 IEEE 12th international conference on embedded software and systems. IEEE; 2015. p. 336–41.
[28]
Liu X, Yang X, Luo Y, et al. Anonymous electronic health record sharing scheme based on decentralized hierarchical attribute-based encryption in cloud environment IEEE Access 2020 8 200180-200193
[29]
Mashima D, Ahamad M. Enhancing accountability of electronic health record usage via patient-centric monitoring. In: Proceedings of the 2nd ACM SIGHIT international health informatics symposium (IHI '12). Association for computing machinery, New York, NY, USA. 2019; p. 409–18.
[30]
Masood I, Wang Y, Daud Aljohani NR, and Dawood H Towards smart healthcare: patient data privacy and security in sensor-cloud infrastructure Wireless Commun Mob Comput. 2018 2018 2143897
[31]
Masud M, Gaba GS, Choudhary K, et al. A robust and lightweight secure access scheme for cloud based e-healthcare services Peer-to-peer Netw Appl 2021 14 5 3043-3057
[32]
Menon MS et al. A hybrid framework for drug response similarity opting machine learning approach Turk J Comput Math Educ (TURCOMAT) 2021 12 11 550-558
[33]
Misaki E, Apiola M, Gaiani S. Technology for agriculture: information channels for decision making in chamwino, tanzania. In: 2015 IEEE International conference on engineering, technology and innovation/international technology management conference (ICE/ITMC). IEEE; 2015. p. 1–8.
[34]
Narayanan U, Paul V, and Joseph S A novel system architecture for secure authentication and data sharing in cloud enabled big data environment J King Saud Univ Comput Inf Sci. 2020 34 3121-3135
[35]
Praveen K and Alphonse PJA Attribute based encryption in cloud computing: a survey, gap analysis, and future directions J Netw Comput Appl 2018 108 37-52
[36]
Porwal S, Mittal S. Implementation of ciphertext policy-attribute based encryption (cp-abe) for fine grained access control of university data. In: 2017 tenth international conference on contemporary computing (IC3), 2017. p. 1–7.
[37]
Qiao Z, Liang S, Davis S, et al. Survey of attribute based encryption. In: 15th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). 2014. p. 1–6.
[38]
Qin B, Deng H, Wu Q, et al. Flexible attribute-based encryption applicable to secure e-healthcare records Int J Inf Secur 2015 14 6 499-511
[39]
Sahai A and Waters B Cramer R Fuzzy identity-based encryption Advances in cryptology—EUROCRYPT 2005 2005 Berlin Springer 457-473
[40]
Sangeetha D and Vaidehi V A secure cloud based personal health record framework for a multi owner environment Ann Telecommun 2017 72 1 95-104
[41]
Sangeetha D, Chakkaravarthy SS, Satapathy SC, et al. Multi keyword searchable attribute based encryption for efficient retrieval of health records in cloud Multimed Tools Appl 2022 81 16 22065-22085
[42]
Saran P, Rajesh D, Pamnani H, et al. A survey on health care facilities by cloud computing. In: 2020 international conference on emerging trends in information technology and engineering (ic-ETITE). IEEE; 2020. p. 1–5.
[43]
Singh I, Kumar D, Khatri SK. Improving the efficiency of e-healthcare system based on cloud. In: 2019 amity international conference on artificial intelligence (AICAI). IEEE; 2019. p. 930–33.
[44]
Soceanu A, Vasylenko M, Egner A, et al. Managing the privacy and security of ehealth data. In: 2015 20th international conference on control systems and computer science. IEEE; 2015. p. 439–46.
[45]
Sowjanya K and Dasgupta M A ciphertext-policy attribute based encryption scheme for wireless body area networks based on ecc J Inf Secur Appl 2020 54 102 559
[46]
Sun PJ Privacy protection and data security in cloud computing: a survey, challenges, and solutions IEEE Access 2019 7 147420-147452
[47]
Walid R, Joshi KP, Geol Choi S, et al. Cloud-based encrypted ehr system with semantically rich access control and searchable encryption. In: 2020 IEEE international conference on big data (Big Data). 2020. p. 4075–4082.
[48]
Yuan E, Tong J. Attributed based access control (abac) for web services. In: IEEE international conference on web services (ICWS’05). IEEE. 2005.
[49]
Zala K, Madhu S. A novel approach to privacy preservation on e-healthcare data in a cloud environment. In: Smart trends in computing and communications, vol. 396. Springer; 2023. p. 149–57.
[50]
Zala K, Thakkar HK, Jadeja R, et al. Prms: design and development of patients’ e-healthcare records management system for privacy preservation in third party cloud platforms IEEE Access 2022 10 85777-85791
[51]
Zhang L, Wu Q, Mu Y, et al. Privacy-preserving and secure sharing of phr in the cloud J Med Syst 2016 40 12 267
[52]
Zhang L, Ye Y, and Mu Y Multiauthority access control with anonymous authentication for personal health record IEEE Internet Things J 2021 8 1 156-167
[53]
Zhiqiang G, Lingsong H, Hang T, et al. A cloud computing based mobile healthcare service system. In: 2015 IEEE 3rd international conference on smart instrumentation. IEEE: measurement and applications (ICSIMA); 2015. p. 1–6.

Index Terms

  1. Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Please enable JavaScript to view thecomments powered by Disqus.

              Information & Contributors

              Information

              Published In

              cover image SN Computer Science
              SN Computer Science  Volume 5, Issue 2
              Jan 2024
              1014 pages

              Publisher

              Springer-Verlag

              Berlin, Heidelberg

              Publication History

              Published: 13 January 2024
              Accepted: 05 December 2023
              Received: 12 July 2023

              Author Tags

              1. Attribute-based encryption (ABE)
              2. Cloud computing
              3. Secure hash algorithm (SHA-1)
              4. Anonymity
              5. Privacy
              6. E-health

              Qualifiers

              • Research-article

              Contributors

              Other Metrics

              Bibliometrics & Citations

              Bibliometrics

              Article Metrics

              • 0
                Total Citations
              • 0
                Total Downloads
              • Downloads (Last 12 months)0
              • Downloads (Last 6 weeks)0
              Reflects downloads up to 20 Nov 2024

              Other Metrics

              Citations

              View Options

              View options

              Login options

              Media

              Figures

              Other

              Tables

              Share

              Share

              Share this Publication link

              Share on social media