4.6 Article

A Lightweight Policy Update Scheme for Outsourced Personal Health Records Sharing

Journal

IEEE ACCESS
Volume 9, Issue -, Pages 54862-54871

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3071150

Keywords

Encryption; Cryptography; Servers; Access control; Outsourcing; Cloud computing; Tools; PHRs; access control; CP-ABE; policy update; proxy re-encryption; policy versioning; performance evaluation

Funding

  1. Sirindhorn International Institute of Technology (SIIT) Young Researcher Grant [SIIT2019-YRG-SF02]

Ask authors/readers for more resources

This paper presents a secure and fine-grained access control scheme based on CP-ABE and PRE for outsourced PHRs, allowing for secure management of access policies, updates, and traceability. Performance evaluation demonstrates the efficiency of the proposed scheme.
With high flexibility and accessibility of data outsourcing environment such as cloud computing environment, several healthcare providers implement electronic personal health records (PHRs) to enable individual patients to manage their own health data in such resilient and scalable environment. However, PHRs contain highly sensitive information of which the security and privacy issues are the critical concern. Besides, PHRs owners should be capable to flexibly and securely define their own access policy for their outsourced data. In addition to the basic authentication feature, existing commercial cloud platforms usually provide symmetric or public key encryption as an optional feature to support data confidentiality for their tenants. However, such traditional encryption schemes are not suitable for data outsourcing environment because of high key management overhead of symmetric encryption and high maintenance cost for handling multiple copies of ciphertext for public key encryption solution. In this paper, we design and develop a secure and fine-grained access control scheme with lightweight access policy update for outsourced PHRs. Our proposed scheme is based on the ciphertext policy attribute-based encryption (CP-ABE) and proxy re-encryption (PRE). In addition, we introduce a policy versioning technique to support the full traceability of policy changes. Finally, we conducted the performance evaluation to demonstrate the efficiency of the proposed scheme.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available