Skip to main content
Log in

Design an attribute based health record protection algorithm for healthcare services in cloud environment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays, personal health records (PHR) has built as a platform for health care data trading. The realistic deployment of PHR in distributed computing infrastructure raises the protection and data security hazards that need to be addressed. However, there have been broad security concerns as personal health data. It could be raised for external servers and treated as unauthenticated cloud servers. The large amount of clients and data owners in the PHR framework who have possibly heavy computational and administration load on the elements in the framework; which will restrict the PHR information accessibility and usability. To find a better solution of above issues, Attribute-based Health Record Protection (AHRP) algorithm is introduced to offer information access control confidentiality, credibility, and secrecy. It is provision of access control to encrypt the information, and a privilege mode for authenticating a message without uncovering the personal information of the patient. Based on Experimental evaluations, proposed Attribute based Health Record Protection Algorithm reduces 0.364 ET (encryption time) in seconds, 0.188 DT (Decryption Time) in seconds for respective records compared than existing methodologies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Duncan B, Whittington M (2014). Reflecting on whether checklists can tick the box for cloud security. In Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on (pp. 805–810).IEEE

  2. Duncan B, Pym DJ, Whittington M (2013).Developing a conceptual framework for cloud security assurance.In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Vol. 2, pp. 120–125).IEEE

  3. Fernández-Cardeñosa G, de la Torre-Díez I, López-Coronado M, Rodrigues JJ (2012) Analysis of cloud-based solutions on EHRs systems in different scenarios. J Med Syst 36(6):3777–3782

    Article  Google Scholar 

  4. Fern'ndez, G., De La Torre-díez, I., & Rodrigues, J. J. (2012). Analysis of the cloud computing paradigm on Mobile Health Records Systems. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on (pp. 927–932). IEEE

  5. Ioannidis C, Pym D, Williams J (2014) Sustainability in information stewardship: time preferences, externalities, and social coordination. RN 14:15

    Google Scholar 

  6. Low C, Chen YH (2012) Criteria for the evaluation of a cloud-based hospital information system outsourcing provider. J Med Syst 36(6):3543–3553

    Article  Google Scholar 

  7. M Kumari, P.S., & Kamal, A.N.B., “Optimal integrity policy for encrypted data in secure storage using cloud computing," Indian J Sci Technol, vol.9, no.8,2016, pp.1–10,2016.

  8. Monikandan S, Arockiam L (2014) A security service algorithm to ensure the confidentiality of data in cloud storage. Int J Eng Res Technol 3(12):1053–1058

    Google Scholar 

  9. Motwani P, Saxena P (2016) Cloud data outsourcing and off sourcing using trust computation. International Journal of Computer Science and Information Technologies 7(3):1417–1424

    Google Scholar 

  10. Poulymenopoulou M, Malamateniou F, Vassilacopoulos G (2012) Emergency healthcare process automation using mobile computing and cloud services. J Med Syst 36(5):3233–3241

    Article  Google Scholar 

  11. Ruebsamen T, Reich C (2013).Supporting cloud accountability by collecting evidence using audit agents.In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Vol. 1, pp. 185–190).IEEE

  12. Thorpe S, Grandison T, Campbell A, Williams J, Burrell K, Ray I (2013).Towards a forensic-based service-oriented architecture framework for auditing of cloud logs.In Services (SERVICES), 203 IEEE Ninth World Congress on (pp. 75–83).IEEE

  13. Zhang R, Liu L (2010). Security models and requirements for healthcare application clouds.In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on (pp. 268–275).IEEE

Download references

Acknowledgements

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through General Research Project under grant number (G.R.P- 76-1440). I would like to thank King Khalid university for the necessary support to lead this paper, we thank our colleagues who sustained greatly assisted this research. We would also like to show our gratitude to for sharing their pearls of wisdom with us during this research, and we thank “anonymous” reviewers for their socalled insights.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Azath Mubarakali.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mubarakali, A., Ashwin, M., Mavaluru, D. et al. Design an attribute based health record protection algorithm for healthcare services in cloud environment. Multimed Tools Appl 79, 3943–3956 (2020). https://doi.org/10.1007/s11042-019-7494-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7494-7

Keywords

Navigation