eesti teaduste
akadeemia kirjastus
SINCE 1952
Proceeding cover
of the estonian academy of sciences
ISSN 1736-7530 (Electronic)
ISSN 1736-6046 (Print)
Impact Factor (2022): 0.9
Secure e-health cloud framework for patients' EHR storage and sharing for Indian Government healthcare model; pp. 266–276
PDF | 10.3176/proc.2020.3.09

Indra Priyadharshini, Vigilson Prem

Medical field is experiencing a huge paradigm shift from traditional healthcare model to electronic healthcare model. Cloud computing facilitates healthcare industry to provide continuous, on-demand services anytime, anywhere. Cloud computing facilitates management but it is also challenging to provide privacy and security in cloud computing. In this paper we propose a secure, privacy-preserving health cloud which allows data exchange between hospitals, healthcare centres, doctors and patients. To accomplish security and privacy, we implement homomorphic encryption (HE), which allows computations to be carried out on encrypted data without even decrypting them. To achieve secure sharing of data among authorized entities, proxy re-encryption (PRE) scheme is combined with homomorphic encryption. Our secure e-health cloud framework achieves performance improvement compared to the Paillier cryptosystem. 


1. Healthcare Industry in India.

2. Usage of HIPPA Act in US.

3. Fundamentals of the crux of our health cloud framework - Homomorphic Encryption.

4. Gentry, C. A fully homomorphic encryption scheme. In Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing (STOC ’09), May 31–June 2, 2009, Bethesda, Maryland, USA. Association for Computing Machinery, New York, 2009, 169–178.

5. Acar, A., Aksu, H., Uluagac, A. S., and Conti, M. A Survey on Homomorphic Encryption Schemes: Theory and Implementation. 1–35.

6. Abbas, A. and Khan, S. U. A review on the state-of-the-art privacy-preserving approaches in the e-Health clouds. IEEE J. Biomed. Health Inf., 2017, 18(4), 1431–1441.

7. Bocu, R. and Costache, C. A homomorphic encryption-based system for securely managing personal health metrics data. IBM J. Res. Dev., 2018, 62(1), 1:1–1:10.

8. Li, Z., Ma, C., and Wang, D. Towards Multi-Hop Homo­morphic Identity-Based Proxy Re-Encryption via Branching Program. IEEE Access, 2017, 5, 16214–16228.

9. Sethi, K., Majumdar, A., and Bera, P. 2017. A novel implementation of parallel homomorphic encryption for secure data storage in cloud. In Proceedings of theInternational Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017), June 1920, 2017, London, UK

10. Chen, M., Qian, Y., Chen, J., Hwang, K., Mao, S., and Hu, L. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing. IEEE Trans. Cloud Comput., 2016, 1.

11. Zhang, C., Zhu, L., Xu, C., and Lu, R. PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system. Future Generation Computer Systems, 2018, 79(1), 16–25.

12. Zhang, Z., Plantard, T., and Susilo, W. Reaction attack on Outsourced Computing with Fully Homomorphic Encryption Schemes. In Proceedings of the International Conference on Information Security and Cryptology (ICISC 2011), November 30 – December 2, 2011, Seoul, KoreaSpringer-Verlag, Berlin, Heidelberg, 2012, 419–436.

13. Hassan. N. A. Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense, 1st ed. Syngress, Rockland, 2016.

14. Chen, M., Hao, Y., Hwang, K., Wang, L., and Wang, L. Disease prediction by machine learning over Big Data from healthcare communities. IEEE Access, 2017, 5, 8869–8879.


16. Paar, C., Pelzl, J., Paar, C., and Pelzl, J. The RSA Cryptosystem. In Understanding Cryptography. Springer, Berlin, Heidelberg, 2009, 173–204.

17. Halevi, S. Homomorphic Encryption. In Tutorials on the Foundations of Cryptography. Information Security and Cryptography (Lindell, Y., ed.). Springer, Cham, 2017, 219–276.

18. Freeman, D. M. Homomorphic Encryption and the BGN Cryptosystem. 2011.

19. Ateniese, G., Fu, K., Green, M., and Hohenberger, S. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 2006, 9(1), 1–30.

20. Shao, J., Lu, R., Lin, X., and Liang, K. Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive Mob. Comput., 2016, 28, 113–121.

21. Aslett, L. J. M., Esperança, P. M., and Holmes, C. C. A review of homomorphic encryption and software tools for encrypted statistical machine learning. arXiv:1508.06574, 2015. 

22. Premarathne, U., Abuadbba, A., Alabdulatif, A., Khalil, I., Tari, Z., Zomaya, A., and Buyya, R. Hybrid cryptographic access control for cloud-based EHR systems. IEEE Cloud Comput., 2016, 3(4), 58–64.

23. Liu, X., Lu, R., Ma, J., Chen, L., and Qin, B. Privacy-preserving patient-centric clinical decision support system on naïve Bayesian classification. IEEE J. Biomed. Health Inf., 2016, 20(2), 655–668.

24. Galbraith, S. D. Elliptic curve Paillier schemes. J. Cryptol., 2002, 15, 129–138.

25. Electronic health record standards for India.

26. Privacy in Cloud Computing. ITU-T Technology Watch Report. ITU Telecommunication Standardization Bureau, 2012.

27. Health and Privacy. Privacy India.

28. Shen, J., Deng, X., and Xu, Z. Multi-security-level cloud storage system based on improved proxy re-encryption. EURASIP J. Wireless Commun. Networking,2019, 277.

Back to Issue