4.5 Article

Fog-Based Secure Framework for Personal Health Records Systems

期刊

CMC-COMPUTERS MATERIALS & CONTINUA
卷 66, 期 2, 页码 1937-1948

出版社

TECH SCIENCE PRESS
DOI: 10.32604/cmc.2020.013025

关键词

Fog computing; personal health records; ciphertext attribute based encryption; secure communications

资金

  1. Deanship of Scientific Research at King Saud University

向作者/读者索取更多资源

The rapid development of personal health records (PHR) systems has led to the need for a secure and fog-assisted framework within a ubiquitous smart city environment to address security, access control, and privacy concerns. This framework utilizes efficient key exchange protocols and ciphertext attribute-based encryption (CP-ABE) to ensure confidentiality and fine-grained access control within the system, while also employing digital signatures combined with CP-ABE for system authentication and user privacy. Analysis of the proposed framework is provided in terms of security and performance.
The rapid development of personal health records (PHR) systems enables an individual to collect, create, store and share his PHR to authorized entities. Health care systems within the smart city environment require a patient to share his PRH data with a multitude of institutions' repositories located in the cloud. The cloud computing paradigm cannot meet such a massive transformative healthcare systems due to drawbacks including network latency, scalability and bandwidth. Fog computing relieves the load of conventional cloud computing by availing intermediate fog nodes between the end users and the remote servers. Assuming a massive demand of PHR data within a ubiquitous smart city, we propose a secure and fog assisted framework for PHR systems to address security, access control and privacy concerns. Built under a fog-based architecture, the proposed framework makes use of efficient key exchange protocol coupled with ciphertext attribute based encryption (CP-ABE) to guarantee confidentiality and fine-grained access control within the system respectively. We also make use of digital signature combined with CP-ABE to ensure the system authentication and users privacy. We provide the analysis of the proposed framework in terms of security and performance.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据