A Survey on Ciphertext Policy Attribute-Based Encryption Scheme based Cloud E- Healthcare Secure Framework

Authors

  • Gurupriya K. G., A. S. Aneeshkumar

Keywords:

Cloud Computing, Healthcare, Cipher text Policy Attribute Based Encryption,

Abstract

The cloud computing has the potential to completely transform healthcare by lowering costs, increasing accessibility, and improving user experience. Healthcare practitioners required to efficiently and reliably communicate data at any time, from anywhere, in order to appropriately monitor patients and make choices on their requirements. When it comes to cloud-based data interchange and outsourcing, patients' electronic health records' security and confidentiality are top priorities. In the medical field, maintaining patient privacy is crucial, even if it is standard procedure to give patient information to other parties.

To address this security gap and offer secured access to medical and healthcare information, this study suggests a secure healthcare framework that runs in the cloud. This article specifically enhances the Ciphertext Policy Attribute Based Encryption (CP-ABE) technique by adding two more modules that work to provide both fine-grained access control and data privacy and integrity. Encryption and hashing systems are made easier by it. We compare the proposed framework to those that have utilized the CP-ABE approach before. It demonstrates the product's enhanced security capabilities for protecting medical records. It is important to consider data security requirements such as privacy, integrity, and fine-grained access control when proposing solutions for ensuring data sharing in the cloud.

Downloads

Download data is not yet available.

References

O. Ali, A. Shrestha, and S. Fosso, International Journal of Information Management, “Cloud computing-enabled healthcare opportunities, issues, and applications: A systematic review,” vol. 43, no. April, pp. 146–158, 2018.

F. Shiferaw and M. Zolfo, “The role of information communication technology (ICT) towards universal health coverage: the first steps of a telemedicine project in Ethiopia,” Global health action, 5(1), 15638, no. June 2014, pp. 0–8, 2012.

J. J. Yang, J. Q. Li, and Y. Niu, “A hybrid solution for privacy preserving medical data sharing in the cloud environment,” Future. Gener. Computer. Syst., vol. 43–44, pp. 74–86, 2015.

A. Jemai, R. Attia, N. Kaaniche, S. Belguith, and M. Laurent, “PHOABE: Securely outsourcing multi-authority attribute-based encryption with policy hidden for cloud assisted IoT,” Computer. Networks, vol. 133, pp. 141–156, 2018.

N. Sultan, “International Journal of Information Management Making use of cloud computing for healthcare provision: Opportunities and challenges,” Int. J. Inf. Manage., vol. 34, no. 2, pp. 177–184, 2014.

N. Y. Lee and B. H. Wu, “Privacy Protection Technology and Access Control Mechanism for Medical Big Data,” Proc. - 2017 6th IIAI Int. Congr. Adv. Appl. Informatics, IIAI-AAI 2017, pp. 424–429, 2017.

L. Ibraimi, M. Asim, and M. Petko, “Secure Management of Personal Health Records by Applying Attribute-Based Encryption,” Proc. 6th Int. Work. Wearable, Micro, Nano Technol. Pers. Heal., pp. 71–74.

H. A. Al Hamid, S. M. M. Rahman, M. S. Hossain, A. Almogren, and A. Alamri, “A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility with Pairing-Based Cryptography,” IEEE Access, pp. 22313–22328, 2017.

T. Kajiyama, M. Jennex, and T. Addo, “To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions,” Inf. Comput. Secur., pp. 00–00, 2017.

M. Sookhak, F. R. Yu, M. K. Khan, Y. Xiang, and R. Buyya, “Attributebased data access control in mobile cloud computing: Taxonomy and open issues,” Futur. Gener. Comput. Syst., vol. 72, pp. 273–287, 2017.

Satar, S.D., Hussin, M., Hanapi, Z., & Mohamed, M.A. (2018). Data Privacy and Integrity Issues Scheme in Cloud Computing: A Survey. International journal of engineering and technology, 7, 102.

F. Xhafa, J. Li, G. Zhao, J. Li, X. Chen, and D. S. Wong, “Designing cloud-based electronic health record system with attribute-based encryption,” Multimedia Tools and Applications, 74(10), 3441- 3458.2014.

Ambarkar S.S., Shekokar N. Internet of Things, Smart Computing and Technology: A Roadmap Ahead. Springer; Cham, Switzerland: 2020. Toward Smart and Secure IoT Based Healthcare System; pp. 283–303.

Farahani B., Firouzi F., Chang V., Badaroglu M., Constant N., Mankodiya K. Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare. Future Gener. Comput. Syst. 2018;78:659–676. doi: 10.1016/j.future.2017.04.036.

Abouelmehdi K., Beni-Hssane A., Khaloufi H., Saadi M. Big data security and privacy in healthcare: A Review. Procedia Comput. Sci. 2017;113:73–80. doi: 10.1016/j.procs.2017.08.292.

K. Yang, Q. Han, H. Li, K. Zheng, Z. Su, and X. Shen, “An Efficient and Fine-Grained Big Data Access Control Scheme with PrivacyPreserving Policy,” IEEE Internet Things J., vol. 4, no. 2, pp. 563–571, 2017.

Semantha F.H., Azam S., Yeo K.C., Shanmugam B. A Systematic Literature Review on Privacy by Design in the Healthcare Sector. Electronics. 2020;9:452. Doi: 10.3390/electronics9030452.

M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attributebased encryption,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131–143, 2013.

S. Sabitha and M. S. Rajasree, “Access control based privacy preserving secure data sharing with hidden access policies in cloud,” J. Syst. Archit., vol. 75, pp. 50–58, 2017.

H. Wang, X. Dong, and Z. Cao, “Multi-value-Independent CiphertextPolicy Attribute Based Encryption with Fast Keyword Search,” IEEE Transactions on Services Computing vol. 1374, no. c, 2017.

L. Zhang, Y. Cui, Y. Mu, and S. Member, “Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing,” IEEE Systems Journa, pp. 1–11, 2019.

Q. Han, Y. Zhang, and H. Li, “Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things,” Future. Gener. Comput. Syst., vol. 83, pp. 269–277, 2018.

Abd Hamid, N., Ahmad, R. and Selamat, S.R., 2017. Recent Trends in Role Mining Algorithms for Role-Based Access Control: A Systematic Review. World Applied Sciences Journal, 35(7), pp.1054-1058.

F. Deng, Y. Wang, L. I. Peng, H. U. Xiong, and Z. Qin, “CiphertextPolicy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records,” IEEE Access, vol. 6, pp. 39473–39486, 2018.

L. Zhang, G. Hu, Y. Mu, and F. Rezaeibagha, “Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System,” IEEE Access, vol. 3536, no. c, pp. 1–1, 2019.

D. Slamanig and C. Stingl, “Privacy Aspects of eHealth,” pp. 1228– 1235, 2008.

Z. Ying, L. U. Wei, Q. I. Li, X. Liu, and J. I. E. Cui, “A Lightweight Policy Preserving EHR Sharing Scheme in the Cloud,” vol. 6, 2018.

N. Muhammad, J. M. Zain, and M. Mohamad, “Current Issues in Ciphertext Policy-Attribute Based Scheme for Cloud Computing : A Survey,” International Journal of Engineering & Technology, vol. 7, pp. 64–67, 2018.

R. Zhang and L. Liu, “Security models and requirements for healthcare application clouds,” Proc. - 2010 IEEE 3rd Int. Conf. Cloud Comput. CLOUD 2010, pp. 268–275, 2010.

Y. Zhang, D. Zheng, and R. H. Deng, “Security and Privacy in Smart Health : Efficient Access Control,” IEEE Internet Things J., vol. 5, no. 3, pp. 2130–2145, 2018.

Rachmawati, D., Tarigan, J. T., & Ginting, A. B. C. (2018, March). A comparative study of Message Digest 5 (MD5) and SHA256 algorithm. In Journal of Physics: Conference Series (Vol. 978, No. 1, p. 012116).

S. Sharaf and N. F. Shilbayeh, “A Secure G-Cloud-Based Framework for Government Healthcare Services,” IEEE Access, vol. 7, pp. 37876– 37882, 2019.

H. Xiong, Y. Zhao, L. Peng, H. Zhang, and K. Yeh, “Partially policyhidden attribute-based broadcast encryption with secure delegation in edge computing,” Futur. Gener. Comput. Syst., vol. 97, pp. 453–461, 2019

Gao F., Sunyaev A. Context matters: A review of the determinant factors in the decision to adopt cloud computing in healthcare. Int. J. Inf. Manag. 2019;48:120–138. Doi: 10.1016/j.ijinfomgt.2019.02.002.

Chen C., Watanabe C., Griffy-Brown C. The co-evolution process of technological innovation—An empirical study of mobile phone vendors and telecommunication service operators in Japan. Technol. Soc. 2007;29:1–22. Doi: 10.1016/j.techsoc.2006.10.008.

Buyya R., Yeo C.S., Venugopal S. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities; Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications; Dalian, China. 25–27 September 2008; pp. 5–13.

Vaquero L.M., Rodero-Merino L., Caceres J., Lindner M. A break in the clouds: Towards a cloud definition. ACM SIGCOMM Comp. Commun. Rev. 2008;39:50–55. Doi: 10.1145/1496091.1496100.

Hathaliya J.J., Tanwar S. An exhaustive survey on security and privacy issues in Healthcare 4.0. Comput. Commun. 2020;153:311–335. doi: 10.1016/j.comcom.2020.02.018.

Liao W.-H., Qiu W.-L. Applying analytic hierarchy process to assess healthcare-oriented cloud computing service systems. SpringerPlus. 2016;5:1–9. doi: 10.1186/s40064-016-2686-3.

Butpheng C., Yeh K.H., Xiong H. Security and Privacy in IoT-Cloud-Based e-Health Systems—A Comprehensive Review. Symmetry. 2020;12:1191. doi: 10.3390/sym12071191.

Botta A., De Donato W., Persico V., Pescapé A. Integration of Cloud computing and Internet of Things: A survey. Future Gener. Comput. Syst. 2016;56:684–700. doi: 10.1016/j.future.2015.09.021.

Azeez N.A., van der Vyver C. Security and privacy issues in e-health cloud-based system: A comprehensive content analysis. Egypt. Inform. J. 2019;93:237–255. doi: 10.1016/j.eij.2018.12.001.

Singh S., Wachter R. Perspectives on medical outsourcing and telemedicine: Rough edges in a flat world? N. Engl. J. Med. 2008;358:1622–1627. Doi: 10.1056/NEJMhle0707298.

Standing S., Standing C. Mobile technology and healthcare: The adoption issues and systemic problems. Int. J. Electron. Health. 2008;4:221–235. Doi: 10.1504/IJEH.2008.022661.

Rahmani A.M., Gia T.N., Negash B., Anzanpour A., Azimi I., Jiang M., Liljeberg P. Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. Future Gener. Computer. Syst. 2018;78:641–658. Doi: 10.1016/j.future.2017.02.014.

Shewale A.D., Sankpal S.V. IOT & Raspberry Pi based Smart and Secure Health Care System using BSN. Int. J. Res. Appl. Sci. Eng. Technol. 2020;8:506–510.

Dang L.M., Piran J., Han D., Min K., Moon H. A Survey on Internet of Things and Cloud Computing for Healthcare. Electronics. 2019;8:768. Doi: 10.3390/electronics8070768.

Wu J., Tian X., Tan Y. Hospital evaluation mechanism based on mobile health for IoT system in social networks. Computer. Biol. Med. 2019;109:138–147. Doi: 10.1016/j.compbiomed.2019.04.021.

Tuli S., Basumatary N., Gill S.S., Kahani M., Arya R.C., Wander G.S., Buyya R. HealthFog: An ensemble deep learning based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in integrated IoT and fog computing environments. Future Gener. Comput. Syst. 2020;104:187–200. Doi: 10.1016/j.future.2019.10.043.

J. Sen, “Security and Privacy Issues in Cloud Computing,” J. Netw. Comput. Appl., vol. 71, no. iv, pp. 11–29, Mar. 2013.

Rakesh K K, Dr.A .S Aneeshkumar, “Optimization of Fuzzy Logic-Based Genetic Algorithm Techniques in Wireless Sensor Networks Protocols”. VOL. 12 NO. 14S (2024)

Downloads

Published

09.07.2024

How to Cite

Gurupriya K. G. (2024). A Survey on Ciphertext Policy Attribute-Based Encryption Scheme based Cloud E- Healthcare Secure Framework. International Journal of Intelligent Systems and Applications in Engineering, 12(22s), 953 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/6579

Issue

Section

Research Article