Privacy Preserving Index for Encrypted Electronic Medical Records

With the development of electronic systems, privacy has become an important security issue in real-life. In medical systems, privacy of patients’ electronic medical records (EMRs) must be fully protected. However, to combine the efficiency and privacy, privacy preserving index is introduced to preserve the privacy, where the EMR can be efficiently accessed by this patient or specific doctor. In the literature, Goh first proposed a secure index scheme with keyword search over encrypted data based on a well-known primitive, Bloom filter. In this paper, we propose a new privacy preserving index scheme, called position index (P-index), with keyword search over the encrypted data. The proposed index scheme is semantically secure against the adaptive chosen keyword attack, and it also provides flexible space, lower false positive rate, and search privacy. Moreover, it does not rely on pairing, a complicate computation, and thus can search over encrypted electronic medical records from the cloud server efficiently.

[1]  Ray Jones,et al.  Using Metrics to Describe the Participative Stances of Members Within Discussion Forums , 2011, Journal of medical Internet research.

[2]  Jeroen Doumen,et al.  Experiments with Queries over Encrypted Data Using Secret Sharing , 2005, Secure Data Management.

[3]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[4]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[5]  Joonsang Baek,et al.  Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.

[6]  N. Archer,et al.  A Comparison of Physician Pre-Adoption and Adoption Views on Electronic Health Records in Canadian Medical Practices , 2011, Journal of medical Internet research.

[7]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[8]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[9]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[10]  Dong Hoon Lee,et al.  On a security model of conjunctive keyword search over encrypted relational database , 2011, J. Syst. Softw..

[11]  N. Terry,et al.  The Emergence of National Electronic Health Record Architectures in the United States and Australia: Models, Costs, and Questions , 2005, Journal of medical Internet research.

[12]  Chun-I Fan,et al.  Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[13]  Brent Waters,et al.  Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.

[14]  Mihir Bellare,et al.  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.

[15]  Judith A. Effken,et al.  Development and initial evaluation of the Clinical Information Systems Success Model (CISSM) , 2013, Int. J. Medical Informatics.

[16]  Bo Zhang,et al.  An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..

[17]  Kihyun Kim,et al.  Public Key Encryption with Conjunctive Field Keyword Search , 2004, WISA.

[18]  Dong Hoon Lee,et al.  Efficient Conjunctive Keyword Search on Encrypted Data Storage System , 2006, EuroPKI.

[19]  Dong Hoon Lee,et al.  Trapdoor security in a searchable public-key encryption scheme with a designated tester , 2010, J. Syst. Softw..

[20]  Eric Horvitz,et al.  Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.

[21]  Ik Rae Jeong,et al.  Analysis of Some Keyword Search Schemes in Encrypted Data , 2008, IEEE Communications Letters.

[22]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[23]  Mihir Bellare,et al.  Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.

[24]  Kenji Araki,et al.  Design and Development of EMR Supporting Medical Process Management , 2012, Journal of Medical Systems.