Skip to main content
Log in

RETRACTED ARTICLE: E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 07 June 2022

This article has been updated

Abstract

File storing and retrieving is performed in the robust as well as secure manner by using the cloud computing technology. Various researchers have developed numerous mechanisms via attribute based encryption for the health care applications. Although, more protocols developed among them only very few techniques were efficient and robust for the quick retrieval of reports from the cloud but many protocols suffer by reason of less security, confidentiality and integrity. Existing techniques was based on encrypting the file based on the keyword. But in our proposed protocol, we have developed an attribute based encryption which will overcome the issues faced by the previous research techniques. The group of patient records are encrypted with single common attribute. From the survey, it is clear that the existing protocols suffer due to high computation and communication complexity. So as to rectify the existing issue, we proposed the effective recovery of files by using attribute based file encryption mechanism from cloud (ERFC). When comparing to the existing protocols, our proposed ERFC mechanism takes minimum computation and communication complexity for four working mechanisms namely, patient key computation, doctor index building computation, cloud working mechanism and finally patient report decryption. All these four working mechanisms are developed for effective recovery of files to the end users. Our proposed protocol is secure against some attacks like Eavesdropping, masquerade, replay and man in the middle attack. Our performance analysis section describes that our ERFC mechanism is better with communication as well as computation complexity when related to the other existing protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Change history

References

  • BaluKuppusamy AK (2014) An expressive and provably secure cipher text-policy attribute-based encryption. Inf Sci 276:354–362

    Article  Google Scholar 

  • ChenY, Jiang ZL, Yiu S, Liu JK, Au MH, Wang X (2014) Fully secure cipher text-policy attribute based encryption with security mediator. In: Proceedings of the 16th international conference on information and communications security, vol 8958, pp 274–289

  • Chu C, Zhu WT, Han J, Liu JK, Xu J, Zhou J (2013) Security concerns in popular cloud storage services. IEEE Pervas Comput 12(4):50–57

    Article  Google Scholar 

  • Deepa N, Pandiaraja P (2019) Hybrid context aware recommendation system for E-Health Care by merkle hash tree from cloud using evolutionary algorithm. Softcomput J 20:20

    Google Scholar 

  • Deepa N, Vijayakumar P, Rawal BS, Balamurugan B (2017) An extensive review and possible attack on the privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. In: IEEE international conference on smart cloud, New York, USA, pp 149–154

  • Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370–384

    Article  MathSciNet  Google Scholar 

  • Fan C, Huang S, Rung H (2014) Arbitrary-state attribute-based encryption with dynamic membership. IEEE Trans Comput 63(8):1951–1961

    Article  MathSciNet  Google Scholar 

  • Gentry C, Silverberg A (2002) Hierarchical ID-based cryptography. Adv Cryptol ASIACRYPT 20:548–566

    MathSciNet  MATH  Google Scholar 

  • GreenM, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX conference on security

  • Guo F, Mu Y, Susilo W, Wong DS, Varadharajan V (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9(5):763–771

    Article  Google Scholar 

  • Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Human Comput 11:1309–1324

    Article  Google Scholar 

  • Hur J (2013) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowl Data Eng 25(10):2271–2282

    Article  Google Scholar 

  • Ibraimi L, Tang Q, Hartel P, Jonker W (2009) Efficient and provable secure cipher text-policy attribute-based encryption schemes. Inf Secur Pract Exp 5451:1–12

    Google Scholar 

  • Indra P, Manikandan M (2020) Multilevel Tetrolet transform based breast cancer classifier and diagnosis system for healthcare applications. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01755-z

    Article  Google Scholar 

  • Jiang T, Chen X, Li J, Wong DS, Ma J, Liu JK (2014) TIMER: secure and reliable cloud storage against data re-outsourcing. In: Proceedings of the 10th international conference on information security practice and experience, vol 8434, pp 346–358

  • Li J, Wang S, Li Y, Wang H, Wang H, Wang H, Chen J, You Z (2019) Efficient attribute-based encryption scheme with policy update and file update in cloud computing. IEEE Trans Ind Inf 15(12):6500–6509

    Article  Google Scholar 

  • Liang K, Liu JK, Wong DS, Susilo W (2014) An efficient cloud based revocable identity-based proxy re-encryption scheme for public clouds data sharing. Comput Secur ESORICS 8712:257–272

    Google Scholar 

  • Liang K, Au MH, Liu JK, Susilo W, Wong DS, Yang G, Yu Y, Yang A (2015) A secure and efficient cipher text-policy attributebased proxy re-encryption for cloud data sharing. Future Gener Comput Syst 52(C):95–108

    Article  Google Scholar 

  • Lilizhang Y, Ma H (2018) Privacy-preserving and dynamic multi-attribute conjunctive keyword search over encrypted cloud data. IEEE Access 6(1):34214–34225

    Google Scholar 

  • Liu X, Ma J, Xiong J, Liu G (2014) Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data. Int J Netw Secur 16(6):437–443

    Google Scholar 

  • Liu J, Huang X, Liu JK (2015) Secure sharing of personal health records in cloud computing. Future Gener Comput Syst 52(C):67–76

    Article  Google Scholar 

  • Liu JK, Au MH, Huang X, Lu R, Li J (2016) Fine-grained two factor access control for web-based cloud computing services. IEEE Trans Inf Forensics Secur 11(3):484–497

    Article  Google Scholar 

  • Nishide T, Yoneyama K, Ohta K (2008) Attribute-based encryption with partially hidden encryptor-specified access structures. Appl Cryptogr Netw Secur 5037:111–129

    MATH  Google Scholar 

  • Pandiaraja P, Deepa N (2019) A novel data privacy-preserving protocol for multi-data users by using genetic algorithm. Soft Comput J 20:1–15

    Google Scholar 

  • Pournaghi SM, Bayat M, Farjami Y (2020) MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01710-y

    Article  Google Scholar 

  • Radogna AV, Fiore N, Tumolo MR (2019) Exhaled breath monitoring during home ventilo-therapy in COPD patients by a new distributed tele-medicine system. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01618-2

    Article  Google Scholar 

  • Sahai A, Waters B (2005) Fuzzy identity-based encryption. Adv Cryptol EUROCRYPT 10:457–473

    MathSciNet  MATH  Google Scholar 

  • Wang S, Yu J, Zhang P, Wang P (2015) A novel file hierarchy access control scheme using attribute-based encryption. Appl Mech Mater 701:911–918

    Google Scholar 

  • Wang S, Zhang Y, Zhang Y (2018a) A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6(1):38437–38450

    Article  Google Scholar 

  • Wang N, Junsong F, Bhargava BK, Zeng J (2018b) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653–2667

    Article  Google Scholar 

  • Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient PHR service system supporting fuzzy keyword search and fine grained access control. Soft Comput 18(9):1795–1802

    Article  Google Scholar 

  • Xie X, Ma H, Li J, Chen X (2013) An efficient cipher text-policy attribute-based access control towards revocation in cloud computing. J Univ Comput Sci 19(16):2349–2367

    Google Scholar 

  • Xiong H, Zhang H, Sun J (2019) Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Syst J 13(3):2739–2750

    Article  Google Scholar 

  • Xue K, Chen W, Li W, Hong J, Hong P (2018) Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Trans Inf Forensics Secur 13(8):2062–2074

    Article  Google Scholar 

  • Yang Y, Liu JK, Liang K, Choo KR, Zhou J (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. Comput Secur ESORICS 9327:146–166

    Google Scholar 

  • Yuen TH, Zhang Y, Yiu S, Liu JK (2014) Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks. Comput Secur ESORICS 8712:130–147

    Google Scholar 

  • Zemmoudj S, Bermad N, Omar M (2019) Context-aware pseudonymization and authorization model for IoT-based smart hospitals. J Ambient Intell Human Comput 10:4473–4490

    Article  Google Scholar 

  • Zheng H, Yuan Q, Chen J (2015) “A framework for protecting personal information and privacy. Security and Communication Networks 8(16):2867–2874

    Article  Google Scholar 

  • Zhu W, Yu J, Wang T, Zhang P, Xie W (2014) Efficient attribute-based encryption from R-LWE. Chin J Electron 23(4):778–782

    Google Scholar 

  • Zou X (2013) A hierarchical attribute-based encryption scheme. Wuhan Univ J Nat Sci 18(3):259–264

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Deepa.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-04069-4

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Deepa, N., Pandiaraja, P. RETRACTED ARTICLE: E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption. J Ambient Intell Human Comput 12, 4877–4887 (2021). https://doi.org/10.1007/s12652-020-01911-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-01911-5

Keywords

Navigation