Practically adaptable CPABE based Health-Records sharing framework (2403.06347v1)
Abstract: With recent elevated adaptation of cloud services in almost every major public sector, the health sector emerges as a vulnerable segment, particularly in data exchange of sensitive Health records, as determining the retention, exchange, and efficient use of patient records without jeopardizing patient privacy, particularly on mobile-applications remains an area to expand. In the existing scenarios of cloud-mobile services, several vulnerabilities can be found including trapping of data within a single cloud-service-provider and loss of resource control being the significant ones. In this study, we have suggested a CPABE and OAuth2.0 based framework for efficient access-control and authorization respectively to improve the practicality of EHR sharing across a single client-application. In addition to solving issues like practicality, data entrapment, and resource control loss, the suggested framework also aims to provide two significant functionalities simultaneously, the specific operation of client application itself, and straightforward access of data to institutions, governments, and organizations seeking delicate EHRs. Our implementation of the suggested framework along with its analytical comparison signifies its potential in terms of efficient performance and minimal latency as this study would have a considerable impact on the recent literature as it intends to bridge the pragmatic deficit in CPABE-based EHR services.
- Flexible and efficient blockchain-based abe scheme with multi-authority for medical on demand in telemedicine system. IEEE Access 7 (2019) 88012–88025
- Implementing a personal health record cloud platform using ciphertext-policy attribute-based encryption. In: 2012 4th Int. Conf. Intell. Netw. Collab. Syst. INCoS 2012. (2012) 8–14
- Design and implementation of collaborative ciphertext-policy attribute-role based encryption for data access control in cloud. 6(3) 71–84
- Survey on secured health care data sharing on cloud using revocable attribute based encryption schemes. 12(13) (2021) 3319–3325
- Systematic and critical review of rsa based public key cryptographic schemes: Past and present status. IEEE Access 9 (2021) 155949–155976
- Elliptic curve cryptography in cloud security: A survey. In: 2022 12th Int. Conf. Cloud Comput. Data Sci. Eng. (2022) 112–117
- A systematic literature review of attribute based encryption in health services. Journal of King Saud University-Computer and Information Sciences 34(9) (2022) 6743–6774
- Attribute based encryption in cloud computing: A survey, gap analysis, and future directions. J. Netw. Comput. Appl. 108 (2018) 37–52
- Practical medical files sharing scheme based on blockchain and decentralized attribute-based encryption. IEEE Access 9 (2021) 118771–118781
- Developers, G.: Oauth 2.0 policies — google identity — google developers (2022) (accessed Apr. 02, 2022).
- Designing cloud-based electronic health record system with attribute-based encryption. In: Springer. Volume 74. (May 2015) 3441–3458
- Meghanathan, N.: Review of access control models for cloud computing. (2013) 77–85
- : Attribute-based access control - wikipedia (2022) (accessed Jan. 21, 2022).
- Enhanced attribute based encryption for cloud computing. Procedia Comput. Sci. 46 (2015) 689–696
- : What is fine-grained access control? (and why it’s so important) (accessed Jan. 21, 2022).
- : Alternatives for roles/claims access control systems (accessed Jan. 21, 2022).
- A ciphertext-policy attribute based encryption scheme for wireless body area networks based on ecc. J. Inf. Secur. Appl. 54 (2020) 102559
- Attribute-based encryption for fine-grained access control of encrypted data. In: Proc. ACM Conf. Comput. Commun. Secur. (2006) 89–98
- Fuzzy identity-based encryption. In: Lect. Notes Comput. Sci. Volume 3494. (2005) 457–473
- A survey of research progress and development tendency of attribute-based encryption. Sci. World J. 2014 (2014)
- Survey on revocation in ciphertext-policy attribute-based encryption. Sensors (Switzerland) 19(7) (2019) 1–22
- Leiba, B.: Oauth web authorization protocol. IEEE Internet Comput. 16(1) (Jan 2012) 74–77
- Rfc5849-the oauth 1.0 protocol. Technical Report 2, Internet Eng. Task Force (2010)
- IETF: Rfc6749-the.oauth.2. Technical report, Internet Eng. Task Force (2012)
- : What’s the difference between oauth 2.0 and oauth 1.0? — synopsys (accessed Apr. 01, 2022).
- Tassanaviboon, A.: Oauth and abe based authorization in semi-tr usted cloud computing. In: DataCloud’11 - Proc. 2nd Int. Work. Data Intensive Comput. Clouds, Co-located with SC’11. (2011) 41–50
- Sieve: Cryptographically enforced access control for user data in untrusted clouds. In: Proc. 13th USENIX Symp. Networked Syst. Des. Implementation, NSDI 2016. (2016) 611–626
- Tassanaviboon, A.: Secure schemes for semi-trusted environment. Technical report (2011)
- Review on fuzzy authorization for cloud storage. Int. J. Comput. Appl. 131(15) (2015) 1–3
- : A practical client application based on attribute based access control for untrusted cloud storage. (2018) 01–15
- Anonymous electronic health record sharing scheme based on decentralized hierarchical attribute-based encryption in cloud environment. IEEE Access 8 (2020) 200180–200193
- An implementation of the oauth 2.0 for an enterprise service bus alysson. In: Computational Science and Its Applications – ICCSA 2018. ICCSA 2018. Lecture Notes in Computer Science. Volume vol 10960, no. 474. (2018) 693–700
- Implementation of ciphertext policy-attribute based encryption (cp-abe) for fine grained access control of university data. In: 2017 10th Int. Conf. Contemp. Comput. IC3 2017. Volume 2018-Janua. (2018) 1–7
- Junwei, W.: junwei-wang/cpabe: Java realization for ciphertext-policy attribute-based encryption (accessed Mar. 30, 2022).
Sponsor
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.