SlideShare a Scribd company logo
Scalable and Secure Sharing of Personal Health Records in
     Cloud Computing using Attribute-based Encryption
Abstract—

Personal health record (PHR) is an emerging patient-centric model of health
information exchange, which is often outsourced to be stored at a third party, such
as cloud providers. However, there have been wide privacy concerns as personal
health information could be exposed to those third party servers and to
unauthorized parties. To assure the patients’ control over access to their own
PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet,
issues such as risks of privacy exposure, scalability in key management, flexible
access and efficient user revocation, have remained the most important challenges
toward achieving fine-grained, cryptographically enforced data access control. In
this paper, we propose a novel patient-centric framework and a suite of
mechanisms for data access control to PHRs stored in semi-trusted servers. To
achieve fine-grained and scalable data access control for PHRs, we leverage
attribute based encryption (ABE) techniques to encrypt each patient’s PHR file.
Different from previous works in secure data outsourcing, we focus on the multiple
data owner scenario, and divide the users in the PHR system into multiple security
domains that greatly reduces the key management complexity for owners and
users. A high degree of patient privacy is guaranteed simultaneously by exploiting
multi-authority ABE. Our scheme also enables dynamic modification of access
policies or file attributes, supports efficient on-demand user/attribute revocation
and break-glass access under emergency scenarios. Extensive analytical and
experimental results are presented which show the security, scalability and
efficiency of our proposed scheme.
Reasons for the proposal :

While it is exciting to have convenient PHR (Public health records)services for
everyone, there are many security and privacy risks which could impede its wide
adoption. The main concern is about whether the patients could actually control the
sharing of their sensitive personal health information (PHI), especially when they
are stored on a third-party server which people may not fully trust. On the one
hand, although there exist healthcare regulations such as HIPAA which is recently
amended to incorporate business associates [4], cloud providers are usually not
covered entities [5]. On the other hand, due to the high value of the sensitive
personal health information (PHI), the third-party storage servers are often the
targets of various malicious behaviors which may lead to exposure of the PHI.

Existing proposal :

A feasible and promising approach would be to encrypt the data before
outsourcing. Basically, the PHR owner herself should decide how to encrypt her
files and to allow which set of users to obtain access to each file. A PHR file
should only be available to the users who are given the corresponding decryption
key, while remain confidential to the rest of users. Furthermore, the patient shall
always retain the right to not only grant, but also revoke access privileges when
they feel it is necessary.

Demerits :

However, the goal of patient-centric privacy is often in conflict with scalability in a
PHR system. The authorized users may either need to access the PHR for personal
use or professional purposes. Examples of the former are family member and
friends, while the latter can be medical doctors, pharmacists, and researchers, etc.
We refer to the two categories of users as personal and professional users,
respectively. The latter has potentially large scale; should each owner herself be
directly responsible for managing all the professional users, she will easily be
overwhelmed by the key management overhead. In addition, since those users’
access requests are generally unpredictable, it is difficult for an owner to determine
a list of them. On the other hand, different from the single data owner scenario
considered in most of the existing works [8], [9], in a PHR system, there are
multiple owners who may encrypt according to their own ways, possibly using
different sets of cryptographic keys. Letting each user obtain keys from every
owner whose PHR she wants to read would limit the accessibility since patients are
not always online. An alternative is to employ a central authority (CA) to do the
key management on behalf of all PHR owners, but this requires too much trust on a
single authority (i.e., cause the key escrow problem).

Proposed system :

In this paper, we endeavor to study the patientcentric, secure sharing of PHRs
stored on semi-trusted servers, and focus on addressing the complicated and
challenging key management issues. In order to protect the personal health data
stored on a semi-trusted server, we adopt attribute-based encryption (ABE) as the
main encryption primitive. Using ABE, access policies are expressed based on the
attributes of users or data, which enables a patient to selectively share her PHR
among a set of users by encrypting the file under a set of attributes, without the
need to know a complete list of users. The complexities per encryption, key
generation and decryption are only linear with the number of attributes involved.
However, to integrate ABE into a large-scale PHR system, important issues such
as key management scalability, dynamic policy updates, and efficient on-demand
revocation are non-trivial to solve, and remain largely open up-to-date. To this end,
we make the following main contributions:
(1) We propose a novel ABE-based framework for patient-centric secure sharing of
PHRs in cloud computing environments, under the multi-owner settings. To
address the key management challenges, we conceptually divide the users in the
system into two types of domains, namely public and personal domains. In
particular, the majority professional users are managed distributively by attribute
authorities in the former, while each owner only needs to manage the keys of a
small number of users in her personal domain. In this way, our framework can
simultaneously handle different types of PHR sharing applications’ requirements,
while incurring minimal key management overhead for both owners and users in
the system. In addition, the framework enforces write access control, handles
dynamic policy updates, and provides break-glass access to PHRs under
emergence scenarios.

More Related Content

What's hot (10)

DOC
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
PPTX
kpit ppt
Manoj Kumar K.M
 
PPTX
secured storage of Personal health record in cloude
Mahaveer kandgule
 
PPTX
Scalable and secure sharing of personal health records in cloud computing usi...
Naveena N
 
PPTX
Efficient sharing of personal health records using encryption in cloud computing
Naveena N
 
PPTX
Scalable and secure sharing of public health record using attribute based Enc...
shreyank byadagi
 
PDF
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Editor IJCATR
 
PPTX
Scalable and secure sharing of personal health records
colourswathi
 
PDF
Dotnet scalable and secure sharing of personal health records in cloud compu...
Ecway Technologies
 
PDF
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
ZTech Proje
 
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
kpit ppt
Manoj Kumar K.M
 
secured storage of Personal health record in cloude
Mahaveer kandgule
 
Scalable and secure sharing of personal health records in cloud computing usi...
Naveena N
 
Efficient sharing of personal health records using encryption in cloud computing
Naveena N
 
Scalable and secure sharing of public health record using attribute based Enc...
shreyank byadagi
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Editor IJCATR
 
Scalable and secure sharing of personal health records
colourswathi
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Ecway Technologies
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
ZTech Proje
 

Similar to Scalable and secure sharing of personal health (20)

PDF
Full paper
Harilal Punalur
 
PDF
Full paper
Harilal Punalur
 
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
Harilal Punalur
 
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
Harilal Punalur
 
PDF
Kg3617691773
IJERA Editor
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
IEEEFINALYEARPROJECTS
 
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
IEEEGLOBALSOFTTECHNOLOGIES
 
PDF
Ijarcet vol-2-issue-3-925-932
Editor IJARCET
 
PDF
A Novel Framework for Securing Medical Records in Cloud Computing
IJMER
 
PDF
Iaetsd scalable and secure sharing of personal health
Iaetsd Iaetsd
 
DOCX
Scalable and secure of personal health records in cloud computing using attri...
Shakas Technologies
 
DOCX
Scalable and secure of personal health records in cloud computing using attri...
Shakas Technologies
 
DOCX
Dotnet scalable and secure sharing of personal health records in cloud compu...
Ecway Technologies
 
PDF
Java scalable and secure sharing of personal health records in cloud computi...
ecwayerode
 
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
PDF
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
PDF
Android scalable and secure sharing of personal health records in cloud comp...
ecway
 
DOCX
Android scalable and secure sharing of personal health records in cloud comp...
ecway
 
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
ecway
 
Full paper
Harilal Punalur
 
Full paper
Harilal Punalur
 
Scalable and secure sharing of personal health records in cloud computing usi...
Harilal Punalur
 
Scalable and secure sharing of personal health records in cloud computing usi...
Harilal Punalur
 
Kg3617691773
IJERA Editor
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
Scalable and secure sharing of personal health records in cloud computing usi...
IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
IEEEGLOBALSOFTTECHNOLOGIES
 
Ijarcet vol-2-issue-3-925-932
Editor IJARCET
 
A Novel Framework for Securing Medical Records in Cloud Computing
IJMER
 
Iaetsd scalable and secure sharing of personal health
Iaetsd Iaetsd
 
Scalable and secure of personal health records in cloud computing using attri...
Shakas Technologies
 
Scalable and secure of personal health records in cloud computing using attri...
Shakas Technologies
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Ecway Technologies
 
Java scalable and secure sharing of personal health records in cloud computi...
ecwayerode
 
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Android scalable and secure sharing of personal health records in cloud comp...
ecway
 
Android scalable and secure sharing of personal health records in cloud comp...
ecway
 
Scalable and secure sharing of personal health records in cloud computing usi...
ecway
 
Ad
Ad

Recently uploaded (20)

PDF
Our Guide to the July 2025 USPS® Rate Change
Postal Advocate Inc.
 
PPTX
Natural Language processing using nltk.pptx
Ramakrishna Reddy Bijjam
 
PDF
Andreas Schleicher_Teaching Compass_Education 2040.pdf
EduSkills OECD
 
PDF
CAD25 Gbadago and Fafa Presentation Revised-Aston Business School, UK.pdf
Kweku Zurek
 
PPTX
ENGLISH 8 REVISED K-12 CURRICULUM QUARTER 1 WEEK 1
LeomarrYsraelArzadon
 
PPTX
PLANNING A HOSPITAL AND NURSING UNIT.pptx
PRADEEP ABOTHU
 
PDF
COM and NET Component Services 1st Edition Juval Löwy
kboqcyuw976
 
PDF
I3PM Industry Case Study Siemens on Strategic and Value-Oriented IP Management
MIPLM
 
PDF
The Power of Compound Interest (Stanford Initiative for Financial Decision-Ma...
Stanford IFDM
 
PPTX
The Gift of the Magi by O Henry-A Story of True Love, Sacrifice, and Selfless...
Beena E S
 
PPTX
How to Configure Taxes in Company Currency in Odoo 18 Accounting
Celine George
 
PPTX
Connecting Linear and Angular Quantities in Human Movement.pptx
AngeliqueTolentinoDe
 
PDF
Nanotechnology and Functional Foods Effective Delivery of Bioactive Ingredien...
rmswlwcxai8321
 
PDF
Genomics Proteomics and Vaccines 1st Edition Guido Grandi (Editor)
kboqcyuw976
 
PPTX
Elo the Hero is an story about a young boy who became hero.
TeacherEmily1
 
PPTX
PLANNING FOR EMERGENCY AND DISASTER MANAGEMENT ppt.pptx
PRADEEP ABOTHU
 
PPTX
grade 8 week 2 ict.pptx. matatag grade 7
VanessaTaberlo
 
PPTX
Parsing HTML read and write operations and OS Module.pptx
Ramakrishna Reddy Bijjam
 
PPTX
Exploring Linear and Angular Quantities and Ergonomic Design.pptx
AngeliqueTolentinoDe
 
PDF
TechSoup Microsoft Copilot Nonprofit Use Cases and Live Demo - 2025.06.25.pdf
TechSoup
 
Our Guide to the July 2025 USPS® Rate Change
Postal Advocate Inc.
 
Natural Language processing using nltk.pptx
Ramakrishna Reddy Bijjam
 
Andreas Schleicher_Teaching Compass_Education 2040.pdf
EduSkills OECD
 
CAD25 Gbadago and Fafa Presentation Revised-Aston Business School, UK.pdf
Kweku Zurek
 
ENGLISH 8 REVISED K-12 CURRICULUM QUARTER 1 WEEK 1
LeomarrYsraelArzadon
 
PLANNING A HOSPITAL AND NURSING UNIT.pptx
PRADEEP ABOTHU
 
COM and NET Component Services 1st Edition Juval Löwy
kboqcyuw976
 
I3PM Industry Case Study Siemens on Strategic and Value-Oriented IP Management
MIPLM
 
The Power of Compound Interest (Stanford Initiative for Financial Decision-Ma...
Stanford IFDM
 
The Gift of the Magi by O Henry-A Story of True Love, Sacrifice, and Selfless...
Beena E S
 
How to Configure Taxes in Company Currency in Odoo 18 Accounting
Celine George
 
Connecting Linear and Angular Quantities in Human Movement.pptx
AngeliqueTolentinoDe
 
Nanotechnology and Functional Foods Effective Delivery of Bioactive Ingredien...
rmswlwcxai8321
 
Genomics Proteomics and Vaccines 1st Edition Guido Grandi (Editor)
kboqcyuw976
 
Elo the Hero is an story about a young boy who became hero.
TeacherEmily1
 
PLANNING FOR EMERGENCY AND DISASTER MANAGEMENT ppt.pptx
PRADEEP ABOTHU
 
grade 8 week 2 ict.pptx. matatag grade 7
VanessaTaberlo
 
Parsing HTML read and write operations and OS Module.pptx
Ramakrishna Reddy Bijjam
 
Exploring Linear and Angular Quantities and Ergonomic Design.pptx
AngeliqueTolentinoDe
 
TechSoup Microsoft Copilot Nonprofit Use Cases and Live Demo - 2025.06.25.pdf
TechSoup
 

Scalable and secure sharing of personal health

  • 1. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Abstract— Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our proposed scheme.
  • 2. Reasons for the proposal : While it is exciting to have convenient PHR (Public health records)services for everyone, there are many security and privacy risks which could impede its wide adoption. The main concern is about whether the patients could actually control the sharing of their sensitive personal health information (PHI), especially when they are stored on a third-party server which people may not fully trust. On the one hand, although there exist healthcare regulations such as HIPAA which is recently amended to incorporate business associates [4], cloud providers are usually not covered entities [5]. On the other hand, due to the high value of the sensitive personal health information (PHI), the third-party storage servers are often the targets of various malicious behaviors which may lead to exposure of the PHI. Existing proposal : A feasible and promising approach would be to encrypt the data before outsourcing. Basically, the PHR owner herself should decide how to encrypt her files and to allow which set of users to obtain access to each file. A PHR file should only be available to the users who are given the corresponding decryption key, while remain confidential to the rest of users. Furthermore, the patient shall always retain the right to not only grant, but also revoke access privileges when they feel it is necessary. Demerits : However, the goal of patient-centric privacy is often in conflict with scalability in a PHR system. The authorized users may either need to access the PHR for personal use or professional purposes. Examples of the former are family member and friends, while the latter can be medical doctors, pharmacists, and researchers, etc. We refer to the two categories of users as personal and professional users,
  • 3. respectively. The latter has potentially large scale; should each owner herself be directly responsible for managing all the professional users, she will easily be overwhelmed by the key management overhead. In addition, since those users’ access requests are generally unpredictable, it is difficult for an owner to determine a list of them. On the other hand, different from the single data owner scenario considered in most of the existing works [8], [9], in a PHR system, there are multiple owners who may encrypt according to their own ways, possibly using different sets of cryptographic keys. Letting each user obtain keys from every owner whose PHR she wants to read would limit the accessibility since patients are not always online. An alternative is to employ a central authority (CA) to do the key management on behalf of all PHR owners, but this requires too much trust on a single authority (i.e., cause the key escrow problem). Proposed system : In this paper, we endeavor to study the patientcentric, secure sharing of PHRs stored on semi-trusted servers, and focus on addressing the complicated and challenging key management issues. In order to protect the personal health data stored on a semi-trusted server, we adopt attribute-based encryption (ABE) as the main encryption primitive. Using ABE, access policies are expressed based on the attributes of users or data, which enables a patient to selectively share her PHR among a set of users by encrypting the file under a set of attributes, without the need to know a complete list of users. The complexities per encryption, key generation and decryption are only linear with the number of attributes involved. However, to integrate ABE into a large-scale PHR system, important issues such as key management scalability, dynamic policy updates, and efficient on-demand revocation are non-trivial to solve, and remain largely open up-to-date. To this end, we make the following main contributions:
  • 4. (1) We propose a novel ABE-based framework for patient-centric secure sharing of PHRs in cloud computing environments, under the multi-owner settings. To address the key management challenges, we conceptually divide the users in the system into two types of domains, namely public and personal domains. In particular, the majority professional users are managed distributively by attribute authorities in the former, while each owner only needs to manage the keys of a small number of users in her personal domain. In this way, our framework can simultaneously handle different types of PHR sharing applications’ requirements, while incurring minimal key management overhead for both owners and users in the system. In addition, the framework enforces write access control, handles dynamic policy updates, and provides break-glass access to PHRs under emergence scenarios.