Abstract
File storing and retrieving is performed in the robust as well as secure manner by using the cloud computing technology. Various researchers have developed numerous mechanisms via attribute based encryption for the health care applications. Although, more protocols developed among them only very few techniques were efficient and robust for the quick retrieval of reports from the cloud but many protocols suffer by reason of less security, confidentiality and integrity. Existing techniques was based on encrypting the file based on the keyword. But in our proposed protocol, we have developed an attribute based encryption which will overcome the issues faced by the previous research techniques. The group of patient records are encrypted with single common attribute. From the survey, it is clear that the existing protocols suffer due to high computation and communication complexity. So as to rectify the existing issue, we proposed the effective recovery of files by using attribute based file encryption mechanism from cloud (ERFC). When comparing to the existing protocols, our proposed ERFC mechanism takes minimum computation and communication complexity for four working mechanisms namely, patient key computation, doctor index building computation, cloud working mechanism and finally patient report decryption. All these four working mechanisms are developed for effective recovery of files to the end users. Our proposed protocol is secure against some attacks like Eavesdropping, masquerade, replay and man in the middle attack. Our performance analysis section describes that our ERFC mechanism is better with communication as well as computation complexity when related to the other existing protocols.
Similar content being viewed by others
Change history
07 June 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s12652-022-04069-4
References
BaluKuppusamy AK (2014) An expressive and provably secure cipher text-policy attribute-based encryption. Inf Sci 276:354–362
ChenY, Jiang ZL, Yiu S, Liu JK, Au MH, Wang X (2014) Fully secure cipher text-policy attribute based encryption with security mediator. In: Proceedings of the 16th international conference on information and communications security, vol 8958, pp 274–289
Chu C, Zhu WT, Han J, Liu JK, Xu J, Zhou J (2013) Security concerns in popular cloud storage services. IEEE Pervas Comput 12(4):50–57
Deepa N, Pandiaraja P (2019) Hybrid context aware recommendation system for E-Health Care by merkle hash tree from cloud using evolutionary algorithm. Softcomput J 20:20
Deepa N, Vijayakumar P, Rawal BS, Balamurugan B (2017) An extensive review and possible attack on the privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. In: IEEE international conference on smart cloud, New York, USA, pp 149–154
Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370–384
Fan C, Huang S, Rung H (2014) Arbitrary-state attribute-based encryption with dynamic membership. IEEE Trans Comput 63(8):1951–1961
Gentry C, Silverberg A (2002) Hierarchical ID-based cryptography. Adv Cryptol ASIACRYPT 20:548–566
GreenM, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX conference on security
Guo F, Mu Y, Susilo W, Wong DS, Varadharajan V (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9(5):763–771
Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Human Comput 11:1309–1324
Hur J (2013) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowl Data Eng 25(10):2271–2282
Ibraimi L, Tang Q, Hartel P, Jonker W (2009) Efficient and provable secure cipher text-policy attribute-based encryption schemes. Inf Secur Pract Exp 5451:1–12
Indra P, Manikandan M (2020) Multilevel Tetrolet transform based breast cancer classifier and diagnosis system for healthcare applications. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01755-z
Jiang T, Chen X, Li J, Wong DS, Ma J, Liu JK (2014) TIMER: secure and reliable cloud storage against data re-outsourcing. In: Proceedings of the 10th international conference on information security practice and experience, vol 8434, pp 346–358
Li J, Wang S, Li Y, Wang H, Wang H, Wang H, Chen J, You Z (2019) Efficient attribute-based encryption scheme with policy update and file update in cloud computing. IEEE Trans Ind Inf 15(12):6500–6509
Liang K, Liu JK, Wong DS, Susilo W (2014) An efficient cloud based revocable identity-based proxy re-encryption scheme for public clouds data sharing. Comput Secur ESORICS 8712:257–272
Liang K, Au MH, Liu JK, Susilo W, Wong DS, Yang G, Yu Y, Yang A (2015) A secure and efficient cipher text-policy attributebased proxy re-encryption for cloud data sharing. Future Gener Comput Syst 52(C):95–108
Lilizhang Y, Ma H (2018) Privacy-preserving and dynamic multi-attribute conjunctive keyword search over encrypted cloud data. IEEE Access 6(1):34214–34225
Liu X, Ma J, Xiong J, Liu G (2014) Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data. Int J Netw Secur 16(6):437–443
Liu J, Huang X, Liu JK (2015) Secure sharing of personal health records in cloud computing. Future Gener Comput Syst 52(C):67–76
Liu JK, Au MH, Huang X, Lu R, Li J (2016) Fine-grained two factor access control for web-based cloud computing services. IEEE Trans Inf Forensics Secur 11(3):484–497
Nishide T, Yoneyama K, Ohta K (2008) Attribute-based encryption with partially hidden encryptor-specified access structures. Appl Cryptogr Netw Secur 5037:111–129
Pandiaraja P, Deepa N (2019) A novel data privacy-preserving protocol for multi-data users by using genetic algorithm. Soft Comput J 20:1–15
Pournaghi SM, Bayat M, Farjami Y (2020) MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01710-y
Radogna AV, Fiore N, Tumolo MR (2019) Exhaled breath monitoring during home ventilo-therapy in COPD patients by a new distributed tele-medicine system. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01618-2
Sahai A, Waters B (2005) Fuzzy identity-based encryption. Adv Cryptol EUROCRYPT 10:457–473
Wang S, Yu J, Zhang P, Wang P (2015) A novel file hierarchy access control scheme using attribute-based encryption. Appl Mech Mater 701:911–918
Wang S, Zhang Y, Zhang Y (2018a) A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6(1):38437–38450
Wang N, Junsong F, Bhargava BK, Zeng J (2018b) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653–2667
Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient PHR service system supporting fuzzy keyword search and fine grained access control. Soft Comput 18(9):1795–1802
Xie X, Ma H, Li J, Chen X (2013) An efficient cipher text-policy attribute-based access control towards revocation in cloud computing. J Univ Comput Sci 19(16):2349–2367
Xiong H, Zhang H, Sun J (2019) Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Syst J 13(3):2739–2750
Xue K, Chen W, Li W, Hong J, Hong P (2018) Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Trans Inf Forensics Secur 13(8):2062–2074
Yang Y, Liu JK, Liang K, Choo KR, Zhou J (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. Comput Secur ESORICS 9327:146–166
Yuen TH, Zhang Y, Yiu S, Liu JK (2014) Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks. Comput Secur ESORICS 8712:130–147
Zemmoudj S, Bermad N, Omar M (2019) Context-aware pseudonymization and authorization model for IoT-based smart hospitals. J Ambient Intell Human Comput 10:4473–4490
Zheng H, Yuan Q, Chen J (2015) “A framework for protecting personal information and privacy. Security and Communication Networks 8(16):2867–2874
Zhu W, Yu J, Wang T, Zhang P, Xie W (2014) Efficient attribute-based encryption from R-LWE. Chin J Electron 23(4):778–782
Zou X (2013) A hierarchical attribute-based encryption scheme. Wuhan Univ J Nat Sci 18(3):259–264
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-04069-4
About this article
Cite this article
Deepa, N., Pandiaraja, P. RETRACTED ARTICLE: E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption. J Ambient Intell Human Comput 12, 4877–4887 (2021). https://doi.org/10.1007/s12652-020-01911-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-01911-5