Medical field is experiencing a huge paradigm shift from traditional healthcare model to electronic healthcare model. Cloud computing facilitates healthcare industry to provide continuous, on-demand services anytime, anywhere. Cloud computing facilitates management but it is also challenging to provide privacy and security in cloud computing. In this paper we propose a secure, privacy-preserving health cloud which allows data exchange between hospitals, healthcare centres, doctors and patients. To accomplish security and privacy, we implement homomorphic encryption (HE), which allows computations to be carried out on encrypted data without even decrypting them. To achieve secure sharing of data among authorized entities, proxy re-encryption (PRE) scheme is combined with homomorphic encryption. Our secure e-health cloud framework achieves performance improvement compared to the Paillier cryptosystem.
1. Healthcare Industry in India.
https://www.ibef.org/industry/healthcare-india.aspx
2. Usage of HIPPA Act in US.
https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act
3. Fundamentals of the crux of our health cloud framework - Homomorphic Encryption.
https://en.wikipedia.org/wiki/Homomorphic_encryption
4. Gentry, C. A fully homomorphic encryption scheme. In Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing (STOC ’09), May 31–June 2, 2009, Bethesda, Maryland, USA. Association for Computing Machinery, New York, 2009, 169–178.
https://doi.org/10.1145/1536414.1536440
5. Acar, A., Aksu, H., Uluagac, A. S., and Conti, M. A Survey on Homomorphic Encryption Schemes: Theory and Implementation. 1–35.
https://doi.org/10.1145/3214303
6. Abbas, A. and Khan, S. U. A review on the state-of-the-art privacy-preserving approaches in the e-Health clouds. IEEE J. Biomed. Health Inf., 2017, 18(4), 1431–1441.
https://doi.org/10.1109/JBHI.2014.2300846
7. Bocu, R. and Costache, C. A homomorphic encryption-based system for securely managing personal health metrics data. IBM J. Res. Dev., 2018, 62(1), 1:1–1:10.
https://doi.org/10.1147/jrd.2017.2755524
8. Li, Z., Ma, C., and Wang, D. Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program. IEEE Access, 2017, 5, 16214–16228.
https://doi.org/10.1109/ACCESS.2017.2740720
9. Sethi, K., Majumdar, A., and Bera, P. 2017. A novel implementation of parallel homomorphic encryption for secure data storage in cloud. In Proceedings of theInternational Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017), June 19–20, 2017, London, UK.
https://doi.org/10.1109/CyberSecPODS.2017.8074851
10. Chen, M., Qian, Y., Chen, J., Hwang, K., Mao, S., and Hu, L. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing. IEEE Trans. Cloud Comput., 2016, 1.
https://doi.org/10.1109/TCC.2016.2617382
11. Zhang, C., Zhu, L., Xu, C., and Lu, R. PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system. Future Generation Computer Systems, 2018, 79(1), 16–25.
https://doi.org/10.1016/j.future.2017.09.002
12. Zhang, Z., Plantard, T., and Susilo, W. Reaction attack on Outsourced Computing with Fully Homomorphic Encryption Schemes. In Proceedings of the International Conference on Information Security and Cryptology (ICISC 2011), November 30 – December 2, 2011, Seoul, Korea. Springer-Verlag, Berlin, Heidelberg, 2012, 419–436.
https://doi.org/10.1007/978-3-642-31912-9_28
13. Hassan. N. A. Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense, 1st ed. Syngress, Rockland, 2016.
14. Chen, M., Hao, Y., Hwang, K., Wang, L., and Wang, L. Disease prediction by machine learning over Big Data from healthcare communities. IEEE Access, 2017, 5, 8869–8879.
https://doi.org/10.1109/ACCESS.2017.2694446
15. https://en.wikipedia.org/wiki/Primary_Health_Centre_(India)
16. Paar, C., Pelzl, J., Paar, C., and Pelzl, J. The RSA Cryptosystem. In Understanding Cryptography. Springer, Berlin, Heidelberg, 2009, 173–204.
https://doi.org/10.1007/978-3-642-04101-3_7
17. Halevi, S. Homomorphic Encryption. In Tutorials on the Foundations of Cryptography. Information Security and Cryptography (Lindell, Y., ed.). Springer, Cham, 2017, 219–276.
https://doi.org/10.1007/978-3-319-57048-8_5
18. Freeman, D. M. Homomorphic Encryption and the BGN Cryptosystem. 2011.
http://theory.stanford.edu/~dfreeman/cs259c-f11/lectures/bgn
19. Ateniese, G., Fu, K., Green, M., and Hohenberger, S. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 2006, 9(1), 1–30.
https://doi.org/10.1145/1127345.1127346
20. Shao, J., Lu, R., Lin, X., and Liang, K. Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive Mob. Comput., 2016, 28, 113–121.
https://doi.org/10.1016/j.pmcj.2015.06.016
21. Aslett, L. J. M., Esperança, P. M., and Holmes, C. C. A review of homomorphic encryption and software tools for encrypted statistical machine learning. arXiv:1508.06574, 2015.
22. Premarathne, U., Abuadbba, A., Alabdulatif, A., Khalil, I., Tari, Z., Zomaya, A., and Buyya, R. Hybrid cryptographic access control for cloud-based EHR systems. IEEE Cloud Comput., 2016, 3(4), 58–64.
https://doi.org/10.1109/MCC.2016.76
23. Liu, X., Lu, R., Ma, J., Chen, L., and Qin, B. Privacy-preserving patient-centric clinical decision support system on naïve Bayesian classification. IEEE J. Biomed. Health Inf., 2016, 20(2), 655–668.
https://doi.org/10.1109/JBHI.2015.2407157
24. Galbraith, S. D. Elliptic curve Paillier schemes. J. Cryptol., 2002, 15, 129–138.
https://doi.org/10.1007/s00145-001-0015-6
25. Electronic health record standards for India.
https://www.nhp.gov.in/data-privacy-and-security_mtl
26. Privacy in Cloud Computing. ITU-T Technology Watch Report. ITU Telecommunication Standardization Bureau, 2012.
https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000160001PDFE.pdf
27. Health and Privacy. Privacy India.
https://cis-india.org/internet-governance/health-privacy.pdf/view
28. Shen, J., Deng, X., and Xu, Z. Multi-security-level cloud storage system based on improved proxy re-encryption. EURASIP J. Wireless Commun. Networking,2019, 277.
https://doi.org/10.1186/s13638-019-1614-y