Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system

Abstract In the era of big data, there are several insuperable research challenges in establishing Electronic Medical Record (EMR) for updating massive data with traditional methods. It is an attractive option to create the cloud-based EMR system, since cloud provides elastic and affordable data storage and management services. However, once the medical records are uploaded into the cloud, the owner will lose the control over the data, and sensitive contents might be accessed or modified by unauthorized entities. To address this issue, we propose a multicopy provable data possession for cloud-based EMR systems, which ensures the integrity and privacy of EMR data. In particular, to achieve data updates, we design a novel dynamic structure that improves the Merkle Hash Tree for multicopy storage, which achieves full dynamics efficiently and safely. Moreover, a random masking technique is employed in our proposal to generate distinguishable replica blocks of one block. Our construction prevents a verifier from obtaining medical records from challenge responses, but also eliminates exposing the content to unauthorized entities. Our security analysis shows that our scheme is provably secure. Evaluation experiments demonstrate that the proposal has lower communication and computation costs in comparison with the existing schemes.

[1]  Cong Wang,et al.  Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates , 2016, IEEE Transactions on Information Forensics and Security.

[2]  Rajkumar Buyya,et al.  Dynamic remote data auditing for securing big data storage in cloud computing , 2017, Inf. Sci..

[3]  Kim-Kwang Raymond Choo,et al.  Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems , 2019, IEEE Transactions on Dependable and Secure Computing.

[4]  Yong Yu,et al.  Privacy preserving cloud data auditing with efficient key update , 2018, Future Gener. Comput. Syst..

[5]  Josep Domingo-Ferrer,et al.  FRR: Fair remote retrieval of outsourced private medical records in electronic health networks , 2014, J. Biomed. Informatics.

[6]  Ming Li,et al.  Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.

[7]  Huaqun Wang,et al.  Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.

[8]  Tao Zhang,et al.  Semi-supervised learning quantization algorithm with deep features for motor imagery EEG Recognition in smart healthcare application , 2020, Appl. Soft Comput..

[9]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[10]  Roberto Tamassia,et al.  Dynamic provable data possession , 2009, IACR Cryptol. ePrint Arch..

[11]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[12]  Naixue Xiong,et al.  EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing , 2017, Inf. Sci..

[13]  Huaqun Wang,et al.  Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession , 2019, IEEE Transactions on Services Computing.

[14]  Naixue Xiong,et al.  Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system , 2018, Inf. Sci..

[15]  Xiaojiang Du,et al.  IntegrityChain: Provable Data Possession for Decentralized Storage , 2020, IEEE Journal on Selected Areas in Communications.

[16]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[17]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[18]  Jinjun Chen,et al.  MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud , 2015, IEEE Transactions on Computers.

[19]  Hao Yan,et al.  A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[20]  Stephen S. Yau,et al.  Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.

[21]  Anmin Fu,et al.  DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems , 2018, J. Netw. Comput. Appl..

[22]  M. Anwar Hasan,et al.  Provable Multicopy Dynamic Data Possession in Cloud Computing Systems , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Xinpeng Zhang,et al.  Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy , 2016, ACISP.

[24]  Han Zhou,et al.  AKSER: Attribute-based keyword search with efficient revocation in cloud computing , 2018, Inf. Sci..

[25]  Jing Wang,et al.  A Compact Ciphertext-Policy Attribute-Based Encryption Scheme for the Information-Centric Internet of Things , 2018, IEEE Access.

[26]  Naixue Xiong,et al.  An effective information detection method for social big data , 2018, Multimedia Tools and Applications.

[27]  Eric Horvitz,et al.  Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.

[28]  Shuai Li,et al.  Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server , 2018, J. Netw. Comput. Appl..

[29]  J. Jasper,et al.  Cloud based security on outsourcing using blockchain in E-health systems , 2020, Comput. Networks.

[30]  Jinjun Chen,et al.  Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.

[31]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[32]  Benjamin Fabian,et al.  Collaborative and secure sharing of healthcare data in multi-clouds , 2015, Inf. Syst..

[33]  Lei Zhou,et al.  Data integrity verification of the outsourced big data in the cloud environment: A survey , 2018, J. Netw. Comput. Appl..

[34]  Fatos Xhafa,et al.  Designing cloud-based electronic health record system with attribute-based encryption , 2014, Multimedia Tools and Applications.

[35]  Xuejiao Liu,et al.  Secure and efficient querying over personal health records in cloud computing , 2018, Neurocomputing.