Applying time-constraint access control of personal health record in cloud computing

ABSTRACT Due to the advances in medical technology, popularity of education, and increase of public self-consciousness. The World Health Organization (WHO) has promoted the use of e-health tools. The digitalization of patients’ personal health records enables doctors to review parients’ complete medical records and enhance medical efficiency. A personal health record system is established in the cloud to achieve these above goals.Therefore, the aim of this study is to construct an authority management mechanism by incorporating bilinear pairing and time-constraint. The proposed scheme will ensure that an authorized medical personnel can obtain an decryption key only in the legal time interval.

[1]  Eileen Doherty,et al.  Cloud Computing Adoption Readiness and Benefit Realization in Irish SMEs—An Exploratory Study , 2014, Inf. Syst. Manag..

[2]  Jeff Kabachinski,et al.  What is Health Level 7? , 2006, Biomedical instrumentation & technology.

[3]  Yu-Fang Chung,et al.  Efficient migration for mobile computing in distributed networks , 2009, Comput. Stand. Interfaces.

[4]  Robert H. Deng,et al.  Variations of Diffie-Hellman Problem , 2003, ICICS.

[5]  Victor R. L. Shen,et al.  A time- bound hierarchical access control for multicast systems , 2012, 2012 International Conference on Machine Learning and Cybernetics.

[6]  Min-Shiang Hwang Extension of CHW cryptographic key assignment scheme in a hierarchy , 1999 .

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[9]  Antoine Joux,et al.  The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems , 2002, ANTS.

[10]  Dean F. Sittig Personal health records on the internet: a snapshot of the pioneers at the end of the 20th Century , 2002, Int. J. Medical Informatics.

[11]  Christopher S. Yoo,et al.  Cloud Computing: Architectural and Policy Implications , 2011 .

[12]  Waegemann Cp,et al.  Closer to reality. Personal health records represent a step in the right direction for interoperability of healthcare IT systems and accessibility of patient data. , 2005 .

[13]  Luis Miguel Vaquero Gonzalez,et al.  Locking the sky: a survey on IaaS cloud security , 2010, Computing.

[14]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[15]  Arputharaj Kannan,et al.  Hierarchical Key Management Scheme for Securing Mobile Agents with Optimal Computation Time , 2012 .

[16]  David W. Bates,et al.  Viewpoint Paper: A Research Agenda for Personal Health Records (PHRs) , 2008, J. Am. Medical Informatics Assoc..

[17]  C Peter Waegemann,et al.  Closer to reality. Personal health records represent a step in the right direction for interoperability of healthcare IT systems and accessibility of patient data. , 2005, Health management technology.

[18]  Min-Shiang Hwang An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies , 2000, Int. J. Comput. Math..

[19]  Feipei Lai,et al.  Confidentiality Protection of Digital Health Records in Cloud Computing , 2016, Journal of Medical Systems.

[20]  Peter Rittgen,et al.  CLOUD COMPUTING ADOPTION , 2013 .