Skip to main content

Secure Privacy Preserving of Personal Health Records Using Attribute-Based Encryption in Cloud Computing

  • Conference paper
  • First Online:
First International Conference on Artificial Intelligence and Cognitive Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 815))

Abstract

Personal health information is outsourced to be stored in cloud to assure the patients’ control on their information, and the data should be encrypted and stored in the database. The personal information should not be viewed by the doctor, and the health information should not be viewed by the insurance agents; such a way, the system is designed and protected the data in the database. In this paper, we used SHA 512 algorithm for attribute-based encryption and decryption. Based on the personal information, the system will generate the suitable medicine for the patient. An access policy is used to distribute the secret key of the patient to other parties to view the data of the patient. Using IBM-Bluemix load balancers, the system achieved good response time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Green, S. Hohenberger, and B. Waters, “Outsourcing the decryption of abe ciphertexts,” in Usenix Security, 2011.

    Google Scholar 

  2. P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony,” in Engineering in Medicine and Biology Society, 2008. EMBS 2008. 30th Annual International Conference of the IEEE. IEEE, 2008, pp. 755–758.

    Google Scholar 

  3. Farmer, O. Gibson, P. Hayton, K. Bryden, C. Dudley, A. Neil, and L. Tarassenko, “A real-time, mobile phone-based telemedicine system to support young adults with type 1 diabetes,” Informatics in primary care, vol. 13, no. 3, pp. 171–178, 2005.

    Google Scholar 

  4. J. Hur and D.K. Noh, “Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214–1221, July 2011.

    Article  Google Scholar 

  5. S. Jahid, P. Mittal, and N. Borisov, “Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation,” Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), Mar. 2011.

    Google Scholar 

  6. M. Chase and S.S. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS ’09), pp. 121–130, 2009.

    Google Scholar 

  7. IBM Bluemix catalog.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Srujan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

China Appala Naidu, R., Srujan, A., Meghana, K., Srinivas Rao, K., Madhuravani, B. (2019). Secure Privacy Preserving of Personal Health Records Using Attribute-Based Encryption in Cloud Computing. In: Bapi, R., Rao, K., Prasad, M. (eds) First International Conference on Artificial Intelligence and Cognitive Computing . Advances in Intelligent Systems and Computing, vol 815. Springer, Singapore. https://doi.org/10.1007/978-981-13-1580-0_6

Download citation

Publish with us

Policies and ethics