Abstract
Nowadays, personal health records (PHR) has built as a platform for health care data trading. The realistic deployment of PHR in distributed computing infrastructure raises the protection and data security hazards that need to be addressed. However, there have been broad security concerns as personal health data. It could be raised for external servers and treated as unauthenticated cloud servers. The large amount of clients and data owners in the PHR framework who have possibly heavy computational and administration load on the elements in the framework; which will restrict the PHR information accessibility and usability. To find a better solution of above issues, Attribute-based Health Record Protection (AHRP) algorithm is introduced to offer information access control confidentiality, credibility, and secrecy. It is provision of access control to encrypt the information, and a privilege mode for authenticating a message without uncovering the personal information of the patient. Based on Experimental evaluations, proposed Attribute based Health Record Protection Algorithm reduces 0.364 ET (encryption time) in seconds, 0.188 DT (Decryption Time) in seconds for respective records compared than existing methodologies.
Similar content being viewed by others
References
Duncan B, Whittington M (2014). Reflecting on whether checklists can tick the box for cloud security. In Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on (pp. 805–810).IEEE
Duncan B, Pym DJ, Whittington M (2013).Developing a conceptual framework for cloud security assurance.In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Vol. 2, pp. 120–125).IEEE
Fernández-Cardeñosa G, de la Torre-Díez I, López-Coronado M, Rodrigues JJ (2012) Analysis of cloud-based solutions on EHRs systems in different scenarios. J Med Syst 36(6):3777–3782
Fern'ndez, G., De La Torre-díez, I., & Rodrigues, J. J. (2012). Analysis of the cloud computing paradigm on Mobile Health Records Systems. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on (pp. 927–932). IEEE
Ioannidis C, Pym D, Williams J (2014) Sustainability in information stewardship: time preferences, externalities, and social coordination. RN 14:15
Low C, Chen YH (2012) Criteria for the evaluation of a cloud-based hospital information system outsourcing provider. J Med Syst 36(6):3543–3553
M Kumari, P.S., & Kamal, A.N.B., “Optimal integrity policy for encrypted data in secure storage using cloud computing," Indian J Sci Technol, vol.9, no.8,2016, pp.1–10,2016.
Monikandan S, Arockiam L (2014) A security service algorithm to ensure the confidentiality of data in cloud storage. Int J Eng Res Technol 3(12):1053–1058
Motwani P, Saxena P (2016) Cloud data outsourcing and off sourcing using trust computation. International Journal of Computer Science and Information Technologies 7(3):1417–1424
Poulymenopoulou M, Malamateniou F, Vassilacopoulos G (2012) Emergency healthcare process automation using mobile computing and cloud services. J Med Syst 36(5):3233–3241
Ruebsamen T, Reich C (2013).Supporting cloud accountability by collecting evidence using audit agents.In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Vol. 1, pp. 185–190).IEEE
Thorpe S, Grandison T, Campbell A, Williams J, Burrell K, Ray I (2013).Towards a forensic-based service-oriented architecture framework for auditing of cloud logs.In Services (SERVICES), 203 IEEE Ninth World Congress on (pp. 75–83).IEEE
Zhang R, Liu L (2010). Security models and requirements for healthcare application clouds.In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on (pp. 268–275).IEEE
Acknowledgements
The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through General Research Project under grant number (G.R.P- 76-1440). I would like to thank King Khalid university for the necessary support to lead this paper, we thank our colleagues who sustained greatly assisted this research. We would also like to show our gratitude to for sharing their pearls of wisdom with us during this research, and we thank “anonymous” reviewers for their socalled insights.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mubarakali, A., Ashwin, M., Mavaluru, D. et al. Design an attribute based health record protection algorithm for healthcare services in cloud environment. Multimed Tools Appl 79, 3943–3956 (2020). https://doi.org/10.1007/s11042-019-7494-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-7494-7