skip to main content
10.1145/2638404.2675727acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article

Securing EHRs via CPMA attribute-based encryption on cloud systems

Published:28 March 2014Publication History

ABSTRACT

Electronic Health Records (EHRs) are further driving the volume of data as patients' files, x-rays, lab results, and other sensitive medical records are transmitted across the network. Today, nearly one-third of healthcare providers use mobile devices to access EHRs from cloud systems. With the healthcare industry facing a new reality, healthcare applications are steadily impacting the mobility and security of how caregivers and hospitals are authorized to access vital information. However, mobile services are still not generally allowed to operate with highly sensitive and personal data, mainly due to the lack of a defined security standard, low protection of data transferred through the mobile and wireless network and no standard and widely accepted user authentication method that ensure confidentiality. In this paper, a proposed privacy-preserving EHR system using ciphertext-multi authority attribute-based encryption (CPMA-ABE) will be built. In this system, patients can encrypt their EHRs and store them on semi-trusted cloud servers such that servers do not have access to sensitive EHR contexts. Meanwhile patients maintain full control over access to their EHR files, by assigning fine-grained, attribute-based access privileges to selected data users, while different users can have access to different parts of their EHR. The system also provides extra features such as populating EHR from different EHR cloud systems using ABE.

References

  1. Alemán, J. L. F., Señor, I. C., Lozoya, P. Á. O., & Toval, A. (2013). Security and privacy in electronic health records: A systematic literature review. Journal of biomedical informatics.Google ScholarGoogle Scholar
  2. Joseph A. Akinyele, et al. 2011. Securing electronic medical records using attribute-based encryption on mobile devices. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (SPSM '11). ACM, 75--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Lohr H., S. A. (2010). Securing the e-Health Cloud. Proceedings of the 1st ACM International Health Informatics Symposium, 220--229. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Mell P., G. T. (2011, September). The NIST Definition of Cloud Computing. NIST Special Publication 800-145. Gaithersburg, MD, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Raju, S. e. (2004). Status of Mobile Computing in Health Care: An Evidence Study. 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 3274--3277Google ScholarGoogle Scholar
  6. Ries, M. D. (2014). Electronic Medical Records: Friends or Foes?. Clinical Orthopaedics and Related Research®, 472(1), 16--21.Google ScholarGoogle Scholar
  7. Wu R., A. G. (2012). Secure Sharing of Electronic Health Records in Clouds. In Proeedings of the 8th IEEE International Conference on Collaborative (pp. 1--8). Pittsburgh: CollaborateCom.Google ScholarGoogle Scholar
  8. Zhang R., et al. (2013). Role-Based and Time-bound Access and Management of EHR Data. Security and Communication Networks.Google ScholarGoogle Scholar
  9. Zhang R., Liu L. (2010). Security Models and Requirements for Healthcare Application Clouds. Proceeding CLOUD '10 Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing, 268--275. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Cpabe http://hms.isi.jhu.edu/acsc/cpabe/Google ScholarGoogle Scholar

Index Terms

  1. Securing EHRs via CPMA attribute-based encryption on cloud systems

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ACM SE '14: Proceedings of the 2014 ACM Southeast Regional Conference
            March 2014
            265 pages
            ISBN:9781450329231
            DOI:10.1145/2638404
            • Conference Chair:
            • Ken Hoganson,
            • Program Chair:
            • Selena He

            Copyright © 2014 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 28 March 2014

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate178of377submissions,47%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader