Secure Sharing of Patient Controlled e-Health Record using an Enhanced Access Control Model with Encryption Based on User Identity

被引:0
|
作者
Singh, Mohinder B. [1 ]
Jaisankar, N. [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
关键词
Access permissions; fine-grained access control; identity based encryption; key generation center; electronic health record; POLICY; PRIVACY;
D O I
10.14569/IJACSA.2024.01503124
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Healthcare industry is converting to digital due to the constantly evolving medical needs in the modern digital age. Many researchers have put up models like Ciphertext Policy Attribute Based Encryption (CPABE) to provide security to health records. But, the CPABE-variants failed to give total control of a medical record to its corresponding owner i.e., patient. Recently, Mittal et al. suggested that Identity Based Encryption (IBE) can be used to achieve this. But, this model used a Key Generation Center (KGC) to maintain keys that reduces the trust as the keys may get leaked. To overcome this problem, an enhanced access control model along with data encryption is presented where a separate key generation center is not needed. Because of this, the processing time for setting-up and extraction of keys is minimized. The total processed time of proposed is 74.42ms. But, the same is 92.89ms, 165.42ms, and 218.75ms in case of Boneh-Franklin, Zhang et al., and Yu et al., respectively. Our proposed model also gives a patient the complete control of his/her own health record. The data owner can decide who can access the record (full/ partial) with what access rights (read/ write/ update). The data requestors can be a doctor/ nurse/ insurance providers/ researchers and so on. The requestors are not based on groups or roles but based on an identity that is accepted by the data owner. The proposed model also withstands the key leakage attacks that are due to the key generation center.
引用
收藏
页码:1267 / 1276
页数:10
相关论文
共 50 条
  • [1] Secure Data Sharing Scheme using Identity-based Encryption for e-Health Record
    Purnamasari, Dian Neipa
    Sudarsono, Amang
    Kristalina, Prima
    2018 INTERNATIONAL ELECTRONICS SYMPOSIUM ON ENGINEERING TECHNOLOGY AND APPLICATIONS (IES-ETA), 2018, : 60 - 65
  • [2] Secure Access Control of E-Health System with Attribute-Based Encryption
    Yan, Hongyang
    Li, Jin
    Li, Xuan
    Zhao, Gansen
    Lee, Sun-Young
    Shen, Jian
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2016, 22 (03): : 345 - 352
  • [3] A Secure Access Control Model for E-health Cloud
    Singh, Ashish
    Chandra, Umesh
    Kumar, Shivesh
    Chatterjee, Kakali
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 2329 - 2334
  • [4] e-SAFE: A secure and efficient access control scheme with attribute convergence and user revocation in fog enhanced IoT for E-Health
    Sarma, Richa
    Moulik, Sanjay
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [5] Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health
    Mittal, Shikha
    Bansal, Ankit
    Gupta, Deepali
    Juneja, Sapna
    Turabieh, Hamza
    Elarabawy, Mahmoud M.
    Sharma, Ashish
    Bitsue, Zelalem Kiros
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [6] Security of Patient's Privacy in E-Health using Secret Sharing and Homomorphism Encryption Scheme
    Agwa, Ngye Antoinette
    Kobayashi, Takumi
    Sugimoto, Chika
    Kohno, Ryuji
    35TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2020), 2020, : 155 - 160
  • [7] Identity Management to Support Access Control in E-Health Systems
    Chen, Xu
    Berry, Damon
    Grimson, William
    4TH EUROPEAN CONFERENCE OF THE INTERNATIONAL FEDERATION FOR MEDICAL AND BIOLOGICAL ENGINEERING, 2009, 22 (1-3): : 880 - 886
  • [8] Attribute based access control scheme with controlled access delegation for collaborative E-health environments
    Pussewalage, Harsha S. Gardiyawasam
    Oleshchuk, Vladimir A.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 37 : 50 - 63
  • [9] A Secure Data Sharing Using Identity-Based Encryption Scheme for e-Healthcare System
    Sudarsono, Amang
    Yuliana, Mike
    Darwito, Haryadi Amran
    2017 3RD INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH), 2017, : 429 - 434
  • [10] Blockchain for Secure EHRs Sharing of Mobile Cloud Based E-Health Systems
    Nguyen, Dinh C.
    Pathirana, Pubudu N.
    Ding, Ming
    Seneviratne, Aruna
    IEEE ACCESS, 2019, 7 : 66792 - 66806