ESTONIAN ACADEMY
PUBLISHERS
eesti teaduste
akadeemia kirjastus
PUBLISHED
SINCE 1952
 
Proceeding cover
proceedings
of the estonian academy of sciences
ISSN 1736-7530 (Electronic)
ISSN 1736-6046 (Print)
Impact Factor (2022): 0.9
Secure e-health cloud framework for patients' EHR storage and sharing for Indian Government healthcare model; pp. 266–276
PDF | 10.3176/proc.2020.3.09

Authors
Indra Priyadharshini, Vigilson Prem
Abstract

Medical field is experiencing a huge paradigm shift from traditional healthcare model to electronic healthcare model. Cloud computing facilitates healthcare industry to provide continuous, on-demand services anytime, anywhere. Cloud computing facilitates management but it is also challenging to provide privacy and security in cloud computing. In this paper we propose a secure, privacy-preserving health cloud which allows data exchange between hospitals, healthcare centres, doctors and patients. To accomplish security and privacy, we implement homomorphic encryption (HE), which allows computations to be carried out on encrypted data without even decrypting them. To achieve secure sharing of data among authorized entities, proxy re-encryption (PRE) scheme is combined with homomorphic encryption. Our secure e-health cloud framework achieves performance improvement compared to the Paillier cryptosystem. 

References

1. Healthcare Industry in India. 
https://www.ibef.org/industry/healthcare-india.aspx

2. Usage of HIPPA Act in US. 
https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act

3. Fundamentals of the crux of our health cloud framework - Homomorphic Encryption. 
https://en.wikipedia.org/wiki/Homomorphic_encryption

4. Gentry, C. A fully homomorphic encryption scheme. In Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing (STOC ’09), May 31–June 2, 2009, Bethesda, Maryland, USA. Association for Computing Machinery, New York, 2009, 169–178. 
https://doi.org/10.1145/1536414.1536440

5. Acar, A., Aksu, H., Uluagac, A. S., and Conti, M. A Survey on Homomorphic Encryption Schemes: Theory and Implementation. 1–35. 
https://doi.org/10.1145/3214303

6. Abbas, A. and Khan, S. U. A review on the state-of-the-art privacy-preserving approaches in the e-Health clouds. IEEE J. Biomed. Health Inf., 2017, 18(4), 1431–1441. 
https://doi.org/10.1109/JBHI.2014.2300846

7. Bocu, R. and Costache, C. A homomorphic encryption-based system for securely managing personal health metrics data. IBM J. Res. Dev., 2018, 62(1), 1:1–1:10. 
https://doi.org/10.1147/jrd.2017.2755524

8. Li, Z., Ma, C., and Wang, D. Towards Multi-Hop Homo­morphic Identity-Based Proxy Re-Encryption via Branching Program. IEEE Access, 2017, 5, 16214–16228. 
https://doi.org/10.1109/ACCESS.2017.2740720

9. Sethi, K., Majumdar, A., and Bera, P. 2017. A novel implementation of parallel homomorphic encryption for secure data storage in cloud. In Proceedings of theInternational Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017), June 1920, 2017, London, UK
https://doi.org/10.1109/CyberSecPODS.2017.8074851

10. Chen, M., Qian, Y., Chen, J., Hwang, K., Mao, S., and Hu, L. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing. IEEE Trans. Cloud Comput., 2016, 1. 
https://doi.org/10.1109/TCC.2016.2617382

11. Zhang, C., Zhu, L., Xu, C., and Lu, R. PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system. Future Generation Computer Systems, 2018, 79(1), 16–25. 
https://doi.org/10.1016/j.future.2017.09.002

12. Zhang, Z., Plantard, T., and Susilo, W. Reaction attack on Outsourced Computing with Fully Homomorphic Encryption Schemes. In Proceedings of the International Conference on Information Security and Cryptology (ICISC 2011), November 30 – December 2, 2011, Seoul, KoreaSpringer-Verlag, Berlin, Heidelberg, 2012, 419–436. 
https://doi.org/10.1007/978-3-642-31912-9_28

13. Hassan. N. A. Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense, 1st ed. Syngress, Rockland, 2016.

14. Chen, M., Hao, Y., Hwang, K., Wang, L., and Wang, L. Disease prediction by machine learning over Big Data from healthcare communities. IEEE Access, 2017, 5, 8869–8879. 
https://doi.org/10.1109/ACCESS.2017.2694446

15. https://en.wikipedia.org/wiki/Primary_Health_Centre_(India)

16. Paar, C., Pelzl, J., Paar, C., and Pelzl, J. The RSA Cryptosystem. In Understanding Cryptography. Springer, Berlin, Heidelberg, 2009, 173–204. 
https://doi.org/10.1007/978-3-642-04101-3_7

17. Halevi, S. Homomorphic Encryption. In Tutorials on the Foundations of Cryptography. Information Security and Cryptography (Lindell, Y., ed.). Springer, Cham, 2017, 219–276. 
https://doi.org/10.1007/978-3-319-57048-8_5

18. Freeman, D. M. Homomorphic Encryption and the BGN Cryptosystem. 2011. 
http://theory.stanford.edu/~dfreeman/cs259c-f11/lectures/bgn

19. Ateniese, G., Fu, K., Green, M., and Hohenberger, S. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 2006, 9(1), 1–30. 
https://doi.org/10.1145/1127345.1127346

20. Shao, J., Lu, R., Lin, X., and Liang, K. Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive Mob. Comput., 2016, 28, 113–121. 
https://doi.org/10.1016/j.pmcj.2015.06.016

21. Aslett, L. J. M., Esperança, P. M., and Holmes, C. C. A review of homomorphic encryption and software tools for encrypted statistical machine learning. arXiv:1508.06574, 2015. 

22. Premarathne, U., Abuadbba, A., Alabdulatif, A., Khalil, I., Tari, Z., Zomaya, A., and Buyya, R. Hybrid cryptographic access control for cloud-based EHR systems. IEEE Cloud Comput., 2016, 3(4), 58–64. 
https://doi.org/10.1109/MCC.2016.76

23. Liu, X., Lu, R., Ma, J., Chen, L., and Qin, B. Privacy-preserving patient-centric clinical decision support system on naïve Bayesian classification. IEEE J. Biomed. Health Inf., 2016, 20(2), 655–668. 
https://doi.org/10.1109/JBHI.2015.2407157

24. Galbraith, S. D. Elliptic curve Paillier schemes. J. Cryptol., 2002, 15, 129–138. 
https://doi.org/10.1007/s00145-001-0015-6

25. Electronic health record standards for India. 
https://www.nhp.gov.in/data-privacy-and-security_mtl

26. Privacy in Cloud Computing. ITU-T Technology Watch Report. ITU Telecommunication Standardization Bureau, 2012. 
https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000160001PDFE.pdf

27. Health and Privacy. Privacy India. 
https://cis-india.org/internet-governance/health-privacy.pdf/view

28. Shen, J., Deng, X., and Xu, Z. Multi-security-level cloud storage system based on improved proxy re-encryption. EURASIP J. Wireless Commun. Networking,2019, 277. 
https://doi.org/10.1186/s13638-019-1614-y

Back to Issue