ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Investigation on Improving the Security of Public Health Record System in Cloud Computing

E. Kamalakannan1 Arvind .K.S2
  1. PG Scholar, Department of Computer Science and Engineering, Kalaignar Karunanidhi Institute of Technology, Coimbatore, Tamilnadu, India
  2. Assistant Professor, Department of Computer Science and Engineering, Kalaignar Karunanidhi Institute of Technology, Coimbatore, Tamilnadu, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

In Cloud Computing we can integrate the lot of technology. But security is the serious concern while moving to the cloud. We need to provide the security for the cloud data. One of the sensitive information is Medical Records. Handling the medical records in cloud is a very complex one. There is the security threat in cloud computing. So overcome the security threat while maintaining the medical records we need to improve the security level of the PHR system in cloud computing. In this paper we made a Survey on Improving the Security of Public Health Record System in Cloud Computing.

 

Keywords

Cloud Computing, Medical Records, Public Health Record System.

INTRODUCTION

In this paper contains the survey on improving the Security on Public Health Records in Cloud Computing. Section2 includes the Literature Survey. That is the details about the overview of information given in the papers. Section3 contains the Techniques for Securing the PHR. Techniques are Attribute Based Encryption, Attribute Based Broadcast Encryption and Identity Based Encryption.

LITERATURE SURVEY

H. Lohr, A.-R. Sadeghi, provide the paper about the how to secure the Electronic Health Records and what are all the problems maintain the E-Health Records in Cloud Storage and also they gave the cryptographic scheme as well as key management for secure the Electronic Health Records [22]. M. Li, S. Yu, N. Cao, provides the paper on authorization for private keyword search over the encrypted cloud data. This paper provides detailed view for the keyword search which data is stored in cloud [23]. A. Sahai and B. Waters provide the initialization of Attribute Based Encryption as well as detailed about the Fuzzy Identity Based Encryption techniques [1]. M. Li, S. Yu, K., provides the excellent technique for accessing the data i.e. Fine Grained Access Control with the Multi Owners for accessing the records. This paper provides the scalability for the users for accessing the records [3].
Li, M., Lou,. provides the paper on how to secure the data and ensure the privacy of the data [2]. V. Goyal, A. Sahai, and B. Waters, provides the paper on the Fine Grained Access Control with the help of the Attribute Based Encryption. So this provides the detailed view about the scalable of users as well as confidentiality of the data [4]. Ming LiShucheng Yu, Yao Zheng, provides the scalability of the users and secure sharing as well as importantly Revocable Attribute Based Encryption. This paper explains how public key cryptography used with the ABE as well as Fine Grained Access Control [5].
Y. Zheng provides the master thesis for the preserving the privacy of public health records in cloud computing. This paper gives the good understandable about the privacy of the health records to maintain in the cloud [6]. L. Ibraimi, M. Petkovic, S. Nikova, provides the detailed about the Ciphertext Policy with the use of Threshold property that is have to satisfied the condition [7]. S. Yu, C. Wang, and W. Lou, provides the data sharing based on attribute and revocation based on attributes [8]. S. Narayan, M. Gagne´, and R. Safavi-Naini, provides the preserving the privacy of the Electronic Health Records system with the use of the Attribute Based Infrastructure [9]. J. Bethencourt, A. Sahai,B. Waters, provides policy of cipher text with the Attribute Based Encryption [10]. J.A.Akinyele, C.U.Lehmann,provides the detailed about the self-protection of the Electronic Medical Records based on the attribute Based Encryption[11]. M. Chase and S.S. Chow, provides the important aspects of key distribution as well as maintenance of attribute that is Multi Authority [12]. X. Liang, R. Lu, provides the policy on cipher text as well as the more details about the revocations [13].
J. Hur also provides the Attribute Based Encryption with the revocation aspects [14]. A. Boldyreva, V. Goyal, and V. Kumar, provides the Identity Based Encryption with the revocation of IBE [15]. D. Boneh provides the identity based encryption with the concept of weil pairing algorithm aspects [16]. R. Canetti, S. Halevi, and J. Katz provide the different way that is chosen cipher text based on Identity Based Encryption method [17]. N. Attrapadung , provides the good approach that is Broadcast Based Encryption with the property of Conjunctive [18]. Jin Sun, Yupu Hu, provide the cipher text policy on the Broadcast Based Encryption [19]. Boneh D., Gentry. provides the detailed view of the Collusion Resistant on the Broadcast Based Encryption [20]. Zhang L., Hu Y., provide the paper on the Broadcast Based Encryption based on the Identity aspects [21].

TECHNIQUES FOR SECURING THE PHR

A. ATTRIBUTE BASED ENCRYPTION
Attribute Based Encryption [1][10][11][12] is the encryption technique which is used to solve the problems on outsourced data. The initial concept of the Attribute Based Encryption is keys of users and the cipher text are combined with the groups of attributes and using particular exact key only decrypt the cipher text. So there is the match between the cipher text and private as well as attributes. That stages they also used the Biometrics for strong protection.
Then the later years the Attribute Based Encryption [4][5][6][7][9] for one to many approaches [2] i.e. for particular information for many numbers of users with encryption schemes are evolved. This is the excellent technique for handle the many number of users i.e. it increases the scalability. So the Attribute Based Encryption technique can be used for securing the sensitive data like patient record over outsourced data in cloud computing with multi-owner [3]. So we having the excellent option that is Attribute Based Encryption are applicable for Fine Grained Access [4][5].
The most sensitive field is Medical field. So if the medical data is maintained with the Cloud is good one but we have to provide the N number of security for that data.
Figure1 is the Framework for Multiple Owner and Multiple Users and Multiple Authorities for Public Health Records System in Cloud Computing. The diagram clearly explains the system that is the patient can store the health record in cloud with the help of encrypted format. Patient is the data owner. So data owner having the all access rights on that data. So data owner can provide the access rights on the public domain users. The key distribution is controlled by the attribute authorities.
Here Multiple Attribute Authorities [4][5][12] (MAA) for separate domain. MAA maintains the attributes as well as key policy. In public domain except doctor all users are only having the read only rights. The doctor is the ultimate user in public domain so need to give the write option. The key will distribute via the attribute authority. And for Emergency scenario the Break Class Access [4][5] can maintain.
That is that emergency scenario based on the identity can break the normal formalities and can access the whole data from emergency department.
Figure 2 is the diagram for Attribute Hierarchy of the Health files. This diagram clearly explains the hierarchy of Attributes which is going to be encrypted and stored in Cloud Storage.
Figure 3 is the structures for access policy [4][10] which is under the arrangement of the Multiple Attribute Authority. Like Above diagram structure only the policy will assign and access rights are provided. If the policy break at any time means Revocation [8][13][14] will be taken at any time. This attribute based encryption more efficient in conjunctive property.
B. IDENTITY BASED ENCRYPTION
Identity Based Encryption [15][16][17] is better technology for protecting the secure access on the PHR. Because it does not requires the public key cryptosystem. So it’s not depends any public key infrastructure. It based on E-mail or IP address for encryption. Efficient Revocation [15] is possible in the Identity Based Encryption. Fuzzy Identity Based Encryption [1] is method for like threshold value matching. In this scheme like set of attributes should be satisfied in matching. For example 10 out of 12 attributes have to satisfy. So the identity based encryption provides the strong authentication as well as confidentiality.
C. ATTRIBUTE BASED BROADCAST ENCRYPTION
Attribute Based Broadcast Encryption is special encryption technique for Direct Revocation without affecting the non-revoked users [18]. Attribute Based Broadcast Encryption is the Encryption technique for remove the limitations on the Multi-Authority system. In Abstract Based Encryption technique satisfies the Conjunctive property. Even Conjunctive Based Broadcast Encryption efficient in the pairing based cryptography Scheme [18]. Due to some real time limitations on MA-ABE we can move to Attribute Based Broadcast Encryption. ABBE supports the Disjunctive property as well as Conjunctive property.
Advantage of the Attribute Based Broadcast Encryption is it handles the both Cipher text-policy and key policy in efficient manner [19]. ABBE scheme is the strong collision resistant at the handling of cipher text [20]. It overcomes the limitations on ABE. The major advantage of the ABBE scheme is it’s also possible to integrate the Identity i.e. Identity Based Broadcast encryption technique is better way to provide the authentication as well as confidentiality [21]. For the PHR System Attribute Based Broadcast Encryption technique is the better technique to protect the Records.

CONCLUSION

In this paper made a survey on the Improving the Security on Public Health Record System in Cloud Computing. And also made a detailed study about what are the techniques is needed for security the Health Record System. Attribute Based Encryption is the good technique to securing the Health records. It is efficient in the Conjunctive Property. But somewhat limitations on MA-ABE in real time with the property of Disjunctive as well as it had the little bit problem while revocation. Because it can be affect the non-revoked users. So move to the Attribute Based Broadcast Encryption. It satisfies the Disjunctive Property also and handles the revocation perfectly. Identity Based Encryption is the better way to provide the authentication for the Public Health Record System. My future work will be the using the ABBE scheme for securing the PHR system in Cloud Computing.

Figures at a glance

Figure 1 Figure 2 Figure 3
Figure 1 Figure 2 Figure 3

References