An Efficient Model for Secure and Scalable Health Log Management in Cloud using EH-ABE

  • Authors

    • R. Dhanapal
    • P. Visalakshi
    • K. G.Parthiban
    2018-11-27
    https://doi.org/10.14419/ijet.v7i4.19.22078
  • Cloud computing, data sharing, Health Log Management, data privacy, EH-ABE.
  • Cloud computing is a significant computing archetype from which the resources of the computing framework are afforded as on-demand services over the Internet. Considering the advancements of cloud, so many applications based on Health Log Management (HLM) are being developed. Though this paradigm is promising, it also bears many challenges on security and access control of data when it is shared over cloud server. Applying cryptographic methods is an effective way in order to make the sensitive data more confidential from unauthorized parties. That is, to ensure better access control to patient’s health log shared on cloud, it is vital that the records to be encrypted using an efficient technique before outsourcing. Moreover, while focusing on fine grained access control in shared health log, the main consideration has to be on scalable key management and access flexibility. With those concerns, an efficient model has been proposed in this paper using cryptographically enforced security mechanisms. Enhanced Hierarchical-Attribute Based Encryption (EH-ABE) is the technique used here to encrypt the patient/ data owner’s health log and it effectively helps to obtain secure and scalable access control on the shared health log. As a novel try in secure data storage, multi data owner model has been accomplished here. This scenario classifies the owners in HLM into collective security domains that significantly minimize the complication in key management both in owner and user sides. And the experimental analysis portrays that the affirmed work considerably reduces the computation complexity, memory and time utilization, and also enables security, flexibility and scalability on Health Log Management in an effective manner.

     

  • References

    1. [1] Smitha Sundareswaran, Anna C. Squicciarini and Dan Lin, “Ensuring Distributed Accountability for Data Sharing in the Cloudâ€, IEEE Transactions on Dependable and Secure Computing, VOL. 9, NO. 4, JULY/AUGUST 2012, pp. 556-562.

      [2] Qian Wang, Cong Wang, Kui Ren and Wenjing Lou, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,†In the Proceedings of IEEE Transactions on Parallel and Distributed Systems, May 2011, Volume: 22, Issue: 5, pp. 847-859.

      [3] Squicciarini, A, Sundareswaran. S and Dan Lin, “Preventing Information Leakage from Indexing in the Cloud†In the Proceedings of 2010 IEEE Transactions on Distributed Computing, July, 2010, pp. 188 - 195.

      [4] Cong Wang, Qian Wang, Kui Ren, “Towards secure and dependable storage services in cloud computing,†IEEE Transactions on services computing, 2012, Volume: 2, Issue: 2.

      [5] A. Sahai and B. Waters, “Fuzzy identity-based encryption,†Advances in Cryptology EUROCRYPT, May 2005, pp. 457–473.

      [6] Shucheng Yu, Cong Wang, Kui Ren and Wenjing Lou, “Achieving Secure and scalable, Fine-grained Data Access Control in Cloud Computing,†In the Proceedings of IEEE Conference- INFOCOM, March 2010, pp. 1-9.

      [7] Cong Wang and Kui Ren, Jin Li, Wenjing Lou, “Toward publicly auditable secure cloud data storage services,†IEEE Transactions on Secure Computing, July /Aug-2010 ISBN:0890-8044/10.

      [8] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,†University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009.

      [9] Zhigou Wan, Jun'e Liu, Deng, R.H.,“HASBE: A Hierarchical Attribute based Solution for flexible and Scalable access control in cloud computing,†IEEE transactions On Information and Forensics and Security, April-2012, Volume: 7, Issue: 2,pp. 743 – 754.

      [10] Narn-Yih Lee and Yun-Kuan Chang , “Hybrid Provable Data Possession at Untrusted Stores in Cloud Computing,†In the Proceedings of IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS), December, 2011, pp. 638 - 645.

      [11] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute Based Encryption,†IEEE Symposium on Security and Privacy, May 2007, pp. 321- 334.

      [12] L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,†Proceedings of the 14th ACM conference on Computer and communication security, pp. 456–465, October 2007.

      [13] Cong Wang, Qian Wang, Kui Ren nad Wenjing Lou, “Privacy-preserving Public Auditing for Data Storage Security in Cloud computing,†IEEE Transactions on Parallel and Distributed Systems, San Diego, March 2010. ISBN: 1063-6692.

      [14] Ayad F. Barsoum and M. Anwar Hasan, “Integrity Verification of Multiple Data Copies over Untrusted Cloud Servers,†In the Proceedings of 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID 2012), pp. 829-834.

      [15] Dr. Ragesh G. K. , Dr. K. Baskaranb, “Cryptographically Enforced Data Access Control in Personal Health Record Systemsâ€, in the proceedings of Science Direct- Global Colloquium in Recent Advancement and Effectual Researches in Engineering, Science and Technology (RAEREST 2016), Procedia Technology 25 ( 2016 ), pp. 473 – 480.

      [16] Selvamani K, Jayanthi S, “A Review on Cloud Data Security and Its Mitigation Techniquesâ€, Science Direct-Elsevier, International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015), Procedia Computer Science, Vol. 48, 2015 pp. 347 – 352.

      [17] Jianghong Wei, Wenfen Liu, Xuexian Hu, “Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption, †IEEE transaction on cloud computing, Journal Of Latex Class Files, VOL. 14, NO. 8, August 2015, pp 1-13.

      [18] Dimitrios Zissis, Dimitrios Lekkas, “ Addressing cloud computing security issues†science direct-Elsevier, Future Generation Computer Systems, Vol. 28, 2012, pp. 583–592.

      [19] S. Subashini n, V.Kavitha, “A survey on security issues in service delivery models of cloud computingâ€, Journal of Network and Computer Applications, Vol. 34, 2011, pp. 1–11.

      [20] Kihidis, A. , Chalkias, K. and Stephanides, G. , “Practical Implementation of Identity Based Encryption for Secure E-mail Communication,†In the Proceedings of 14th Panhellenic Conference on Informatics (PCI), September, 2010, pp. 101 – 106.

      [21] Prof. Asha Mathew, “Security and privacy Issues of Cloud Computing: Solutions and Secure Framework,†International Journal of Multidisciplinary Research, April, 2012, Volume: 2, Issue: 4, pp. 182-193.

      [22] Soumya Parvatikar, Puja Prakash, Richa Prakash, Pragati Dhawale, S.B. Jadhav,†Secure Sharing Of Personal Health Records Using Multi Authority Attribute Based Encryption in Cloud Computing “, International Journal of Technical Research and Applications, Volume 1, Issue 5 (Nov-Dec 2013), pp. 50-52.

      [23] Ming Li, Shucheng Yu,Yao Zheng, Kui Ren, Wenjing Lou,“ Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,†IEEE Transactions On Parallel And Distributed Systems, Vol. 24, No. 1, January 2013, Pp. 131-143.

      [24] Mr.Prasad P S, Dr. G F Ali Ahammed, “Attribute-Based Encryption for Scalable andSecure Sharing of Personal Health Records in Cloud Computing,†(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, pp.5038-5040.

      [25] Aakanksha Maliye1, Sarita Patil, “Scalable and Secure Sharing in Cloud Computing Using Data Manipulation & Encryptionâ€, International Journal of Science and Research (IJSR), Volume 4 Issue 7, July 2015, pp. 1877-1881.

      [26] K.Senthil K.Prasanthi, “An Efficient Framework for Enhancing Security in the Cloud Environment†International Journal of Engineering Science and Technology, Vol. 5 No. 06S Jun 2013, pp. 76-80.

      [27] Shaik Shahina, Guntapalli Minni And Sayeed Yasin, “Sharing Personal Health Records In Cloud With Scalable And Secure Using ABE,†International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), Volume 23, Issue 8 –NOVEMBER 2016, pp. 61-65.

      [28] Selvamani K, Jayanthi S, “A Review On Cloud Data Security And Its Mitigation Techniques,†Science Direct-International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015), Procedia Computer Science, Vol. 48, 2015, pp. 347 – 352.

      [29] Xuefeng Liu, Yuqing Zhang, Boyang Wang and Jingbo Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud,†IEEE Transactions On Parallel And Distributed Systems, Vol. 24, No. 6, June 2013 Pp.1182-1191.

      [30] S. Subashini, V.Kavitha,“A survey on security issues in service delivery models of cloud computing†Journal of Network and Computer Applications, Vol- 34,2011, pp. 1–11.

      [31] SmithaSundareswaran, Anna C. Squicciarini and Dan Lin, “Ensuring Distributed Accountability for Data sharing in the Cloud,†IEEE Transactions of Dependable and Secure Computing, August 2012, Volume: 8, Issue: 4, pp. 556- 568.

      [32] Prof.Y.B.Gurav and Manjiri deshmukh, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryptionâ€, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.2, February- 2014, pp. 617-625.

  • Downloads

  • How to Cite

    Dhanapal, R., Visalakshi, P., & G.Parthiban, K. (2018). An Efficient Model for Secure and Scalable Health Log Management in Cloud using EH-ABE. International Journal of Engineering & Technology, 7(4.19), 309-318. https://doi.org/10.14419/ijet.v7i4.19.22078