利用云系统实现电子健康档案的机密性(IJCNIS-V10-N1-3)

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

I.J.ComputerNetworkandInformationSecurity,2018,1,18-25PublishedOnlineJanuary2018inMECS()DOI:10.5815/ijcnis.2018.01.03Copyright©2018MECSI.J.ComputerNetworkandInformationSecurity,2018,1,18-25AchievingConfidentialityinElectronicHealthRecordsusingCloudSystemsRobertFrench-BaidooTakoradiTechnicalUniversity,GhanaE-mail:robert.french-baidoo@tpoly.edu.ghDominicAsamoahandStephenOpokuOppongDepartmentofComputerScience,KNUST,Ghana;FacultyofInformatics,GTUC,GhanaE-mail:dominic_asamoah@yahoo.co.uk;sopokuoppong@yahoo.comReceived:26August2017;Accepted:13October2017;Published:08January2018Abstract—Currently,existingmethodsforenforcingaccesstorecordsinanElectronicHealthRecordsystemreliesonasingleTrustedServerwhichstoreshealthrecordsandmediatesaccess.SuchTrustedSeversemployeitheraCiphertext-PolicyAttribute-BasedEncryption(CP-ABE)orKey-PolicyAttribute-BasedEncryption(KP-ABE)methodforstoringandcontrollingaccess.However,TrustedServerstorageofhealthrecordsissusceptibletosingle-point-of-threatattackandasuccessfulattackinvariablyleadstocompromisingtheintegrityofrecordsontheserver.Inthisresearchwork.ThispaperpresentsamethodologythatdefinesandcreatessimpleAccessStructuresandeliminatesneedforprivatekeysduringencryptionand/ordecryptionofhealthrecordswhichistheEnhancedCiphertext-PolicyAttribute-BasedEncryption(ECP-ABE).TheECP-ABEyieldshighcryptographicperformancecreatessimpleAccessStructures,eliminatesneedforprivatekeysandpresentsanimplementationarchitecturethatmakescloud-basedEHRsystemsecureandconfidential.TheECP-ABEalsoperformscryptographicfunctionsusinglessCPUtime,minimalcomputermemoryandproduceshighencryptionanddecryptionthroughputespeciallywithincreasingfilesizes.IndexTerms—TrustedAuthority,AdvanceEncryptionSystem256,SecureHashingAlgorithm256,VirtualElectronicMedicalRecords,PublicKeyInfrastructure,PublicKeyGenerator,RandomAccessMemory.I.INTRODUCTIONThequesttostorehealthrecordselectronicallysothatmanagementofsuchrecordscanbedoneinawell-structuredmannerhasreceivedlotsofattentionlately.Cloud-basedelectronichealthrecordssystemguaranteesround-the-clockrecordsavailabilityregardlessofyourgeographicallocation.ElectronichealthmanagementsystemsmaybeintheformofElectronicHealthRecords(EHR),wheresensitivehealthrecordsofpatientsaregathered,storedandmanagedbyanenterprisesuchahospital,orintheformofPersonalHealthRecords(PHR)wherepatientspurchasetheserviceofathird-partystoragefacilityserviceprovidersothatthepatientcancreate,updateandgenerallymanagetheirownhealthrecordsindependently.Thethirdisahybridsystemwherehealthcarefacilitiesandpatientsplaytheroleofcollectinghealthinformationofpatients,updatingandmanagingthoserecordsintandem.Eachpartyinthehybridsystemhasvaryinglevelsofrightsandprivilegesaccruingtohimorher[1].Unfortunately,cloudserviceproviderswhoaretrustedtosecurestoredrecordshavenotliveduptotask.Twentypercentofhealthcareprovidershavesufferedsecuritybreachesbetweentheyears2009and2013,andaboutFiveHundredhealthrecordshavebeenbreachedthrough804attacks[2].Securityanddataconfidentialityremainsthebiggestthreattoelectronichealthsystems;attacksoncloudsystemsarerelentless.Inappropriateuserrightdefinitionsandpermissions,ineffectiveaccessstructuredefinition,andinsecureimplementationdesignaresomeoftheproblemsbedevilingelectronichealthrecordsystems.II.REALTEDWORKSRelatedtechnologiesarepresentedinthissection.A.HealthInformationPrivacyHealthInsurancePortabilityandAccountabilityAct(HIPAA)1996addressestwomajorissues;PrivacyRuleandSecurityRule.TheHIPAAdocumentdescribesreasonableprocedurestopreventexposureofprotectedhealthinformation[3].TheActcouldnotdealwithprivacymattersrelatingtohealthinformation.Researcherslookedatcryptographytoaddresshealthprivacyandsecuritygapsinthepolicy.Cryptographyisusedininsecureenvironmenttostoreandscrambledatasothatonlyqualifiedpersonscanaccess,readandprocessdata[4].B.Patient-CentricHealthInformationSystemOtherresearcherspostulatedtheconceptofapatient-centricsystem.ThepatientistheownerofthehealthAchievingConfidentialityinElectronicHealthRecordsusingCloudSystems19Copyright©2018MECSI.J.ComputerNetworkandInformationSecurity,2018,1,18-25information,thereforemaintainsandmanagesacopyofhis/hermedicalrecords[5].TheIndivohealthinformationsystemisanexampleofapatient-centricsystem[6].C.SmartCardTheuseofelectronicsmartcardsasamechanismtoguaranteesecuritydata,andtoensureprivacyandconfidentialityinEHRshavetheirownuniqueadvantages.Featuresofsmartcardssuchas;portabilityandmobilityoftheelectronicsmartcardsareadvantagesthatwasharnessedtoprovideaccesssecurityinanelectronicpatienthealthrecordsystem[7].Smartcardsamongwasusedtostoresensitivepatienthealthdataandtoensuredataprivacyanddatasecurityinanelectronichealthinformationsystem.However,duetofrequentmisplacingofsmartcardsanduseofpinnumberstoaccesshealthinformationonsmartcardsmadeinunreliablemeans.D.Attribute-BasedEncryptionsFuzzyIdentity-BasedEncryptionIdentity–BasedEncryption(IBE)accesscontrolpolicycalledFuzzyIdentityBasedEncryptionwasdevelopedtoaddressprivacyandsecurityproblems

1 / 8
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功