Flexible Access Control for Outsourcing Personal Health Services in Cloud Computing using Hierarchical Attribute Set Based Encryption

被引:0
|
作者
Kandasamy, V [1 ]
Papitha, E. [1 ]
机构
[1] Loyola Inst Technol, Dept Informat Technol, Madras 600123, Tamil Nadu, India
关键词
Personal Health Record; Hierarchical attribute Cloud computing; data security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online personal health record (PHR) enables patients to manage their own medical records in a centralized way, which greatly facilitates the storage, access and sharing of personal health data. With the emergence of cloud computing, it is attractive for the PHR service providers to shift their PHR applications and storage into the cloud, in order to enjoy the elastic resources and reduce the operational cost. However, by storing PHRs in the cloud, the patients lose physical control to their personal health data, which makes it necessary for each patient to encrypt her PHR data before uploading to the cloud servers. Under encryption, it is challenging to achieve fine-grained access control to PHR data in a scalable and efficient way by using FADE. For each patient, the PHR data should be encrypted so that it is scalable with the number of users having access. Also, since there are multiple owners (patients) in a PHR system and every owner would encrypt her PHR files using a different set of cryptographic keys, it is important to reduce the key distribution complexity in such multi-owner settings. Existing cryptographic enforced access control schemes are mostly designed for the single-owner scenarios. In order to realize scalable, flexible, and fine-grained access control of outsourced data in cloud computing, in this research, we propose hierarchical attribute-set-based encryption (HASBE) by extending cipher text-policy attribute-set-based encryption (ASBE) with a hierarchical structure of users. The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility and fine-grained access control in supporting compound attributes of ASBE.
引用
收藏
页码:569 / 571
页数:3
相关论文
共 50 条
  • [31] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    Fu, Jing-Yi
    Huang, Qin-Long
    Ma, Zhao-Feng
    Yang, Yi-Xian
    Journal of China Universities of Posts and Telecommunications, 2014, 21 (06): : 45 - 51
  • [32] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    FU Jingyi
    HUANG Qinlong
    MA Zhaofeng
    YANG Yixian
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2014, 21 (06) : 45 - 51+77
  • [33] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    FU Jing-yi
    HUANG Qin-long
    MA Zhao-feng
    YANG Yi-xian
    The Journal of China Universities of Posts and Telecommunications, 2014, (06) : 45 - 51
  • [34] Large universe attribute based encryption enabled secured data access control for cloud storage with computation outsourcing
    Debnath, Somen
    Bhuyan, Bubu
    MULTIAGENT AND GRID SYSTEMS, 2019, 15 (02) : 99 - 119
  • [35] Attribute Based Encryption with Fine-grained Access Provision in Cloud Computing
    Tamizharasi, G. S.
    Balamurugan, B.
    Manjula, R.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [36] Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption
    Asim, Muhammad
    Ignatenko, Tanya
    Petkovic, Milan
    Trivellato, Daniel
    Zannone, Nicola
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 212 - 217
  • [37] An Efficient Ciphertext Policy-Attribute Based Encryption for Big Data Access Control in Cloud Computing
    Kumar, P. Praveen
    Kumar, P. Syam
    Alphonse, P. J. A.
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 114 - 120
  • [38] Toward Ciphertext Policy Attribute Based Encryption Model: A Revocable Access Control Solution in Cloud Computing
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2019), 2020, 12026 : 193 - 207
  • [40] Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption
    Lin, Xi
    Han, Yiliang
    DATA SCIENCE, PT 1, 2017, 727 : 220 - 230