CFP last date
22 April 2024
Reseach Article

Cryptosystem for Personal Health Records in Cloud

Published on July 2015 by Sathish Kumar V E, K Umamaheswari
International Conference on Innovations in Computing Techniques (ICICT 2015)
Foundation of Computer Science USA
ICICT2015 - Number 2
July 2015
Authors: Sathish Kumar V E, K Umamaheswari
e6330359-b921-4a3e-a264-c23ebeacb40a

Sathish Kumar V E, K Umamaheswari . Cryptosystem for Personal Health Records in Cloud. International Conference on Innovations in Computing Techniques (ICICT 2015). ICICT2015, 2 (July 2015), 33-37.

@article{
author = { Sathish Kumar V E, K Umamaheswari },
title = { Cryptosystem for Personal Health Records in Cloud },
journal = { International Conference on Innovations in Computing Techniques (ICICT 2015) },
issue_date = { July 2015 },
volume = { ICICT2015 },
number = { 2 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 33-37 },
numpages = 5,
url = { /proceedings/icict2015/number2/21466-1490/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations in Computing Techniques (ICICT 2015)
%A Sathish Kumar V E
%A K Umamaheswari
%T Cryptosystem for Personal Health Records in Cloud
%J International Conference on Innovations in Computing Techniques (ICICT 2015)
%@ 0975-8887
%V ICICT2015
%N 2
%P 33-37
%D 2015
%I International Journal of Computer Applications
Abstract

Personal Health Record (PHR) sharing in cloud is a major issue in recent trends. The data stored in cloud is not secure because everything depends upon the cloud service provider. An unexpected cloud crash may expose all data in cloud. In order to overcome that a new symmetric key encryption that uses a constant key for encrypting PHR is proposed. The system developed uses a Patient Controlled Encryption (PCE), where the patients control and manage their own health record. The system developed enhances key management by storing the keys by the patient itself. The patients can share their key with whoever they want. The algorithm used here takes less computational time and memory usage for execution than existing cryptographic algorithms.

References
  1. Cheng Kang Chu, ShemanS. M,Chow, Wen GueyTzdeng, "Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage", IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 468-477, Feb. 2014.
  2. Ming Li, Shucheng Yu, Yao Zheng, KuiRen and Wenjing Lou, " Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption", IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131-143, Jan 2013.
  3. Ayushi,"A Symmetric Key Cryptographic Algorithm",International Journal of Computer Applications, vol 1, no. 15, pp. 0975-8887, 2010.
  4. J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records", Proc. ACM Workshop Cloud Computing Security (CCSW '09), pp. 103-114, 2009.
  5. Hans Lohr, Marcel Winandy, Ahmed Regha, "Securing the E HealthCloud", International Conference on Trusted Systems 2009 (INTRUST'09), 2009.
  6. Y. Zheng, "Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption," master's thesis, Worcester Polytechnic Inst. , 2011.
  7. V. Goyal, O. Pandey, A. Sahai, and B. Waters,"Attribute-Based Encryption for Fine-GrainedAccess Control of Encrypted Data," Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), pp. 89-98, 2006.
  8. M. Li, S. Yu, K. Ren, and W. Lou, "SecuringPersonal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings," Proc. Sixth Int' ICST Conf. Security and Privacy in Comm. Networks (SecureComm '10), pp. 89- 106, Sept. 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Personal Health Record Access Control Data Privacy Symmetric Key Encryption Data Security.