Safe Cloud Storage of Medical Information Based on Attribute Encryption

Cloud computing has been developing at a rapid speed, playing an important role in many fields, especially in environments like hospitals which produce a lot of data every day and have specific users. Because the security of the information stored in the cloud cannot be guaranteed, we propose a safe cloud storage of medical information based on attribute encryption. This paper focuses on how to apply attribute-based encryption to hospitals' cloud storage environment, and to design the access process of different users in the cloud environment by using attribute encryption. Our goal is to build a scheme based on attribute encryption in which users with different demands can get the information they need in a safe and convenient way from the cloud server. In the scheme, sensitive information of a patient was encrypted locally based on attributes and then uploaded to the cloud server. We divided the users in the scheme into three kinds: the chief doctor, the doctor who is not in charge of the patient and the patient. Different users have a different way to get information stored in the cloud, and the decryption of the sensitive information is also different. For each step in the scheme, we carried out a security analysis to demonstrate the reliability, security and applicability of our scheme. Keywords—cloud storage; attribute-based encryption; medical information security

[1]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[2]  Xiaohui Liang,et al.  Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.

[3]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[4]  Ming Li,et al.  Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.

[5]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[6]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[7]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[8]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[9]  Brent Waters,et al.  Attribute-Based Encryption , 2009, Identity-Based Cryptography.

[10]  Robert H. Deng,et al.  Dynamic Secure Cloud Storage with Provenance , 2012, Cryptography and Security.

[11]  Marianne Winslett,et al.  Introducing secure provenance: problems and challenges , 2007, StorageSS '07.

[12]  Fagen Li,et al.  Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[13]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[14]  Josep Domingo-Ferrer,et al.  FRR: Fair remote retrieval of outsourced private medical records in electronic health networks , 2014, J. Biomed. Informatics.