4.5 Article

Fog-Based Secure Framework for Personal Health Records Systems

Journal

CMC-COMPUTERS MATERIALS & CONTINUA
Volume 66, Issue 2, Pages 1937-1948

Publisher

TECH SCIENCE PRESS
DOI: 10.32604/cmc.2020.013025

Keywords

Fog computing; personal health records; ciphertext attribute based encryption; secure communications

Funding

  1. Deanship of Scientific Research at King Saud University

Ask authors/readers for more resources

The rapid development of personal health records (PHR) systems has led to the need for a secure and fog-assisted framework within a ubiquitous smart city environment to address security, access control, and privacy concerns. This framework utilizes efficient key exchange protocols and ciphertext attribute-based encryption (CP-ABE) to ensure confidentiality and fine-grained access control within the system, while also employing digital signatures combined with CP-ABE for system authentication and user privacy. Analysis of the proposed framework is provided in terms of security and performance.
The rapid development of personal health records (PHR) systems enables an individual to collect, create, store and share his PHR to authorized entities. Health care systems within the smart city environment require a patient to share his PRH data with a multitude of institutions' repositories located in the cloud. The cloud computing paradigm cannot meet such a massive transformative healthcare systems due to drawbacks including network latency, scalability and bandwidth. Fog computing relieves the load of conventional cloud computing by availing intermediate fog nodes between the end users and the remote servers. Assuming a massive demand of PHR data within a ubiquitous smart city, we propose a secure and fog assisted framework for PHR systems to address security, access control and privacy concerns. Built under a fog-based architecture, the proposed framework makes use of efficient key exchange protocol coupled with ciphertext attribute based encryption (CP-ABE) to guarantee confidentiality and fine-grained access control within the system respectively. We also make use of digital signature combined with CP-ABE to ensure the system authentication and users privacy. We provide the analysis of the proposed framework in terms of security and performance.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available