Efficient Healthcare Integrity Assurance in the Cloud with Incremental Cryptography and Trusted Computing

In this chapter, the authors propose the design and implementation of an integrity-enforcement protocol for detecting malicious modification on Electronic Healthcare Records (EHRs) stored and processed in the cloud. The proposed protocol leverages incremental cryptography premises and trusted computing building blocks to support secure integrity data structures that protect the medical records while: (1) complying with the specifications of regulatory policies and recommendations, (2) highly reducing the mobile client energy consumption, (3) considerably enhancing the performance of the applied cryptographic mechanisms on the mobile client as well as on the cloud servers, and (4) efficiently supporting dynamic data operations on the EHRs.

[1]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[2]  Vasilios Katos,et al.  Data Recovery Strategies for Cloud Environments , 2013 .

[3]  Brian Berger,et al.  Trusted computing group history , 2005, Inf. Secur. Tech. Rep..

[4]  Milos Ivanovic,et al.  Dot Net Platform for Distributed Evolutionary Algorithms with Application in Hydroinformatics , 2014 .

[5]  Nihal Alam,et al.  Cloud Computing and Its Application to Information Centre , 2014 .

[6]  Sean W. Smith,et al.  Building the IBM 4758 Secure Coprocessor , 2001, Computer.

[7]  Ganesh Chandra Deka,et al.  Handbook of Research on Cloud Infrastructures for Big Data Analytics , 2014 .

[8]  Anastasia N. Kastania,et al.  Cloud Computing Applications for Quality Health Care Delivery , 2014 .

[9]  Mihir Bellare,et al.  XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.

[10]  Niraj K. Jha,et al.  Secure Virtual Machine Execution under an Untrusted Management OS , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[11]  G. Annas HIPAA regulations - a new era of medical-record privacy? , 2003, The New England journal of medicine.

[12]  Stefan Berger,et al.  vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.

[13]  Kun Yang,et al.  Addressing Device-Based Adaptation of Services: A Model Driven Web Service Oriented Development Approach , 2013 .

[14]  Božidar Radenković,et al.  From Mainframe to Cloud , 2014 .

[15]  George Mastorakis Resource Management of Mobile Cloud Computing Networks and Environments , 2015 .

[16]  Dean Gonsowski Compliance in the Cloud and the Implications on Electronic Discovery , 2015 .

[17]  Miloš Milutinović,et al.  Ontology-Based Multimodal Language Learning , 2014 .

[18]  Bennet S. Yee,et al.  Dyad : a system for using physically secure coprocessors , 1991 .

[19]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[20]  Marijana Despotović-Zrakić,et al.  Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education , 2014 .

[21]  Daphne Lopez,et al.  Middleware for Preserving Privacy in Big Data , 2014 .

[22]  Vahé A. Kazandjian Not Just Meaningful Data but Coordinated Data!: Can Cloud Computing Promote Down-to-Earth E-Valuation of Disease and Healthcare? , 2015 .

[23]  Binod Gurung,et al.  Integration of Cloud Technologies in Digitally Networked Classrooms and Learning Communities , 2016 .

[24]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[25]  Mihir Bellare,et al.  Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.

[26]  Mihir Bellare,et al.  Incremental cryptography and application to virus protection , 1995, STOC '95.

[27]  Angelos K. Marnerides Anomaly Detection in Cloud Environments , 2015 .