Abstract
In the environment like the Cloud computing or the picture archiving and communications systems (PACS) of the hospital, the user’s data is stored in the storage of a third party. In such entrusted management environment, security is an important issue for the user’s private data. The most basic solution is to encrypt user’s private data. However, if the encryption key is directly managed by cloud service provider (CSP) or PACS service provider (PSP), there is latent threat when it comes to the data loss or leakage which may be committed by malicious insiders. The ownership-guaranteed security framework (OGSF) divides encryption key into a single mandatory fragment and multiple optional fragments while mandating user to store the mandatory fragment in the user’s personal device and mandating CSP or PSP to manage the optional fragments. Because of this division of the management on the encryption key, the OGSF can resolve both threat from the malicious insider and the user’s mistake in same time.
Access this article
We’re sorry, something doesn't seem to be working properly.
Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.







Similar content being viewed by others
References
Haley, K., Wood, P.: 2013 Internet security threat report. Symantec Corporation, Mountain View (2013)
Shin, J.S., Yoo, S.M., Kim, S.W., Ryou, J.C., Jang, H.J.: Study on encryption methodology of optimized for digital medical imaging data. J. Next Gener. Info. Technol. 4(8), 530–537 (2013)
Pianykh, O.S.: Digital imaging and communications in medicine (DICOM): a practical introduction and survival guide. Springer, New York (2011)
U.S. Government. “Guidance regarding methods for de-identification of protected health information in accordance with the health insurance portability and accountability act (HIPAA) privacy rule,” Washington D. C.: U.S. Department of Health and Human Services (2012)
Huang, H.K.: PACS and imaging informatics, pp. 219–236. Wiley, Hoboken (2010)
Cooke, R.E. Jr, Gaeta, M.G., Kaufman, D.M. and Henrici, G. Picture archiving and communication system, U.S. Patent No. 6,574,629 (June 2003)
Chen, J., Qian, F., Yan, W., Shen, B.: Translational biomedical informatics in the cloud: present and future. Biomed Res. Int. 2013, 8 (2013)
Aupet, J.B., Garcia, E., Guyennet, H., Lapayre, J.C., Martins, D.: Security in medical telediagnosis. Multimed. Serv. Intell. Environ. 3, 201–226 (2010)
Stantchev, V., Palacios, R.C., Niedermayer, M.: Cloud Computing Based Systems for Healthcare. Sci. World J. 2014, 2 (2014)
Los, R., Shackleford, D., Sullivan, B.: The notorious nine: cloud computing top threats in 2013, pp. 6–21. Cloud Security Alliance, Nevada (2013)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Sun, Y., Zhang, J., Xiong, Y., Zhu, G.: Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw. 2014, 9 (2014)
Wang, J., Wang, Z.: A survey on personal data cloud. Sci. World J. 2014, 13 (2014)
Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)
Wang, H., Wu, S., Chen, M., Wang, W.: Security protection between users and the mobile media cloud. IEEE Commun. Mag. 52(3), 73–79 (2014)
Tian, F., Gui, X., An, J., Yang, P., An, J., Yang, P., Zhao, J., Zhang, X.: Protecting location privacy for outsourced spatial data in cloud storage. Sci. World J. 2014, 11 (2014)
Kwon, O., Koo, D., Shin, Y., Yoon, H.: A secure and efficient audit mechanism for dynamic shared data in cloud storage. Sci. World J. 2014, 10 (2014)
Chen, C.Y., Tu, J.F.: A novel cloud computing algorithm of security and privacy. Math. Probl. Eng. 2013, 6 (2013)
Noh, G., Chun, J.Y.: Sharing privacy protected and statistically sound clinical research data using outsourced data storage. J. Appl. Math. 2014, 12 (2014)
Haufe, K., Dzombeta, S., Brandis, K.: Proposal for a security management in cloud computing for health care. Sci. World J. 2014, 7 (2014)
Halevi, S., Harnik, D., Pinkas, B., Peleg, A. S. Proofs of ownership in remote storage systems, Proceedings of the 18th ACM conference on Computer and communications security, pp. 491–500 (2011)
Fatma, E.Z.E., Hikal, N.A., Abou-Chadi, F.E.Z.: Secure medical images sharing over cloud computing environment. Int. J. Adv. Comput. Sci. Appl. 4(5), 130–137 (2013)
Yin, X.C., Thiranant, N., Lee, H.: An efficient and secure data storage scheme using ECC in cloud computing. J. Internet Comput. Serv. 15(2), 49–59 (2014)
Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2), 393–399 (2006)
Seenivasagam, V., Velumani, R.: A QR code based zero watermarking scheme for authentication of medical images in teleradiology cloud. Comput. Math. Methods Med. 2013, 16 (2013)
Ko, L.T., Chen, J.E., Shieh, Y.S.: Nested quantization index modulation for reversible watermarking and its application to healthcare information management systems. Comput. Math. Methods Med. 2012, 8 (2012)
Massoudi, A., Lefebvre, F., Vleeschouwer, C.D., Macq, B., Quisquater, J.J.: Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Info. Secur. 2008, 18 (2008)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
BLAKLEY, G.R. Safeguarding cryptographic keys, Proceedings of the National Computer Conference, pp. 313–317 (1979)
Meijering, E.: A chronology of interpolation: from ancient astronomy to modern signal and image processing. Proc. IEEE 90(3), 319–342 (2002)
Berrut, J.P., Trefethen, L.N.: Barycentric lagrange interpolation. Siam Rev. 46(3), 501–517 (2004)
Acknowledgments
This research was partly supported by the IT R&D program of MSIP/IITP (10041579, Development the Personal Information Security service solution using tokenization technology) and the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (NRF-2013R1A1A2013740).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yoo, S., Kim, J., Park, J. et al. Ownership-guaranteed security framework for the private data in the entrusted management environment. Cluster Comput 18, 1251–1261 (2015). https://doi.org/10.1007/s10586-015-0474-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-015-0474-4