Flexible Access Control for Outsourcing Personal Health Services in Cloud Computing using Hierarchical Attribute Set Based Encryption

被引:0
|
作者
Kandasamy, V [1 ]
Papitha, E. [1 ]
机构
[1] Loyola Inst Technol, Dept Informat Technol, Madras 600123, Tamil Nadu, India
关键词
Personal Health Record; Hierarchical attribute Cloud computing; data security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online personal health record (PHR) enables patients to manage their own medical records in a centralized way, which greatly facilitates the storage, access and sharing of personal health data. With the emergence of cloud computing, it is attractive for the PHR service providers to shift their PHR applications and storage into the cloud, in order to enjoy the elastic resources and reduce the operational cost. However, by storing PHRs in the cloud, the patients lose physical control to their personal health data, which makes it necessary for each patient to encrypt her PHR data before uploading to the cloud servers. Under encryption, it is challenging to achieve fine-grained access control to PHR data in a scalable and efficient way by using FADE. For each patient, the PHR data should be encrypted so that it is scalable with the number of users having access. Also, since there are multiple owners (patients) in a PHR system and every owner would encrypt her PHR files using a different set of cryptographic keys, it is important to reduce the key distribution complexity in such multi-owner settings. Existing cryptographic enforced access control schemes are mostly designed for the single-owner scenarios. In order to realize scalable, flexible, and fine-grained access control of outsourced data in cloud computing, in this research, we propose hierarchical attribute-set-based encryption (HASBE) by extending cipher text-policy attribute-set-based encryption (ASBE) with a hierarchical structure of users. The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility and fine-grained access control in supporting compound attributes of ASBE.
引用
收藏
页码:569 / 571
页数:3
相关论文
共 50 条
  • [41] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [42] A Flexible Attribute Based Access Control Method for Grid Computing
    Bo Lang
    Ian Foster
    Frank Siebenlist
    Rachana Ananthakrishnan
    Tim Freeman
    Journal of Grid Computing, 2009, 7
  • [43] A Flexible Attribute Based Access Control Method for Grid Computing
    Lang, Bo
    Foster, Ian
    Siebenlist, Frank
    Ananthakrishnan, Rachana
    Freeman, Tim
    JOURNAL OF GRID COMPUTING, 2009, 7 (02) : 169 - 180
  • [44] A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
    Fu, Junsong
    Wang, Na
    IEEE ACCESS, 2019, 7 : 36218 - 36232
  • [45] Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
    Huang, Qinlong
    Yang, Yixian
    Shen, Mansuo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 239 - 249
  • [46] Efficient Anonymous Attribute-Based Encryption with Access Policy Hidden for Cloud Computing
    Huang, Chanying
    Yan, Kedong
    Wei, Songjie
    Zhang, Gongxuan
    Lee, Dong Hoon
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 266 - 270
  • [47] Secure sharing of personal health records in Jelastic cloud by Attribute based encryption
    Maheswari, S.
    Gudla, Upendra
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [48] An effective Access from Cloud Data using Attribute Based Encryption
    Raghuwanshi, Kapil Dev
    Tamrakar, Sitendra
    2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 212 - 218
  • [49] Securing Fog and Cloud Communication Using Attribute Based Access Control and Re-encryption
    Vohra, Kunal
    Dave, Mayank
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 307 - 312
  • [50] Server-aided revocable attribute-based encryption for cloud computing services
    Cui, Hui
    Yuen, Tsz Hon
    Deng, Robert H.
    Wang, Guilin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (14):