Securing medical data by role-based user policy with partially homomorphic encryption in AWS cloud

被引:4
|
作者
Boomija, M. D. [1 ]
Raja, S. V. Kasmir [1 ]
机构
[1] SRM Inst Sci & Technol, Dept CSE, Kattankulathur, Tamil Nadu, India
关键词
Partially homomorphic encryption; Cloud security; Access policy; AWS S3; IAM; Elastic Beanstalk; ACCESS-CONTROL; STORAGE;
D O I
10.1007/s00500-022-06950-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud technology provides services for storing and accessing a large amount of data with ease of access and less cost. Sensitive data such as patients' electronic health information should be encrypted before outsourcing into the cloud. Many traditional encryption methods are used for protecting data in the cloud, but unable to perform computation on encrypted data. Homomorphic encryption operates directly on the ciphertext. In this study, a Secure Partially Homomorphic Encryption (SPHE) algorithm is proposed to secure the outsourced data and perform multiplication and division operations on the ciphertext. The access control policy in the cloud environment is more flexible. An attacker can easily collect sensitive data by abusing the access policy of another user. Therefore, the database privacy is compromised. Creating a role hierarchy and managing the session is difficult in the cloud environment. The above issues motivate us to develop a model which is the integration of the proposed scheme SPHE with role-based user policy. The model is implemented in Eclipse IDE (Integrated Development Environment) and AWS (Amazon Web Service) Toolkit for Eclipse and deployed in Amazon Elastic Beanstalk (EB) environment. This model is particularly used for securing the patient e-health details and performing computation on outsourced data. The patient details are encrypted by the algorithm SPHE and uploaded in AWS S3 (Simple Storage Service) bucket. The users are created by AWS Identity and Access Management (IAM) service and the access level policy is defined based on user roles in EB environment. The proposed model performance is studied by comparing with other partially homomorphic methods Elgamal, Pailler, and Benaloh. This model achieves data integrity and data confidentiality using the role-based user policy with SPHE.
引用
收藏
页码:559 / 568
页数:10
相关论文
共 50 条
  • [1] Role-based access using partial homomorphic encryption for securing cloud data
    Saxena, Urvashi Rahul
    Alam, Taj
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023, 14 (03) : 950 - 966
  • [2] Role-based access using partial homomorphic encryption for securing cloud data
    Urvashi Rahul Saxena
    Taj Alam
    [J]. International Journal of System Assurance Engineering and Management, 2023, 14 : 950 - 966
  • [3] A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context
    Sultan, Nazatul Haque
    Varadharajan, Vijay
    Zhou, Lan
    Barbhuiya, Ferdous Ahmed
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 1647 - 1661
  • [4] Multi-user Fully Homomorphic Encryption Scheme Based on Policy for Cloud Computing
    Li, Taoshen
    Liu, Qing
    Huang, Ruwei
    [J]. WEB INFORMATION SYSTEMS AND APPLICATIONS (WISA 2021), 2021, 12999 : 274 - 286
  • [5] Role-based Hierarchical Medical Data Encryption for Implantable Medical Devices
    Belkhouja, Taha
    Sorour, Sameh
    Hefeida, Mohamed S.
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [6] Cloud-Based Quadratic Optimization With Partially Homomorphic Encryption
    Alexandru, Andreea B.
    Gatsis, Konstantinos
    Shoukry, Yasser
    Seshia, Sanjit A.
    Tabuada, Paulo
    Pappas, George J.
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (05) : 2357 - 2364
  • [7] Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
    Hingwe, Kamlesh Kumar
    Bhanu, S. Mary Saira
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 437 - 448
  • [8] Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
    Ding, Yong
    Li, Xiumin
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 568 - 571
  • [10] Role based access control using identity and broadcast based encryption for securing cloud data
    Urvashi Rahul Saxena
    Taj Alam
    [J]. Journal of Computer Virology and Hacking Techniques, 2022, 18 : 171 - 182