Skip to main content
placeholder image

Empowering personal health records with cloud computing: how to encrypt with forthcoming fine-grained policies efficiently

Journal Article


Download full-text (Open Access)

Abstract


  • The issue of empowering patients to be well informed with regards to their health records has been

    well accepted in the community, which is known as the Personal Health Record (PHR). PHR has been

    believed as the solution for better management of an individual’s health, and as the tool that will empower

    the patient in correlation with healthcare providers through the ability to provide his/her own

    medical history. In this work, we aim to take one step further by equipping patients with the ability

    to “control” the access to their PHR efficiently and easily, by incorporating the emerging cloud technology.

    Specifically, we aim to provide the patients with the luxury of using the power of the cloud

    to conduct the outsourced work efficiently. To realize this, we present the notion of online/offline

    ciphertext-policy attribute-based proxy re-encryption scheme, which is very useful primitive in empowering

    personal health records in cloud computing. We present such a notion as well as a set of

    security requirements. More specifically, we define two security models covering both outsider and

    insider attacks. Furthermore, we present a concrete construction of such a scheme, and prove that it

    is secure under the well known complexity assumptions and following our security models.

UOW Authors


  •   Gritti, Clementine (external author)
  •   Susilo, Willy
  •   Plantard, Thomas
  •   Liang, Kaitai (external author)
  •   Wong, Duncan S. (external author)

Publication Date


  • 2014

Citation


  • Gritti, C., Susilo, W., Plantard, T., Liang, K. & Wong, D. (2014). Empowering personal health records with cloud computing: how to encrypt with forthcoming fine-grained policies efficiently. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 5 (4), 3-28.

Scopus Eid


  • 2-s2.0-84920149166

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=4299&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/3283

Number Of Pages


  • 25

Start Page


  • 3

End Page


  • 28

Volume


  • 5

Issue


  • 4

Place Of Publication


  • http://jowua.yolasite.com/current-issue.php

Abstract


  • The issue of empowering patients to be well informed with regards to their health records has been

    well accepted in the community, which is known as the Personal Health Record (PHR). PHR has been

    believed as the solution for better management of an individual’s health, and as the tool that will empower

    the patient in correlation with healthcare providers through the ability to provide his/her own

    medical history. In this work, we aim to take one step further by equipping patients with the ability

    to “control” the access to their PHR efficiently and easily, by incorporating the emerging cloud technology.

    Specifically, we aim to provide the patients with the luxury of using the power of the cloud

    to conduct the outsourced work efficiently. To realize this, we present the notion of online/offline

    ciphertext-policy attribute-based proxy re-encryption scheme, which is very useful primitive in empowering

    personal health records in cloud computing. We present such a notion as well as a set of

    security requirements. More specifically, we define two security models covering both outsider and

    insider attacks. Furthermore, we present a concrete construction of such a scheme, and prove that it

    is secure under the well known complexity assumptions and following our security models.

UOW Authors


  •   Gritti, Clementine (external author)
  •   Susilo, Willy
  •   Plantard, Thomas
  •   Liang, Kaitai (external author)
  •   Wong, Duncan S. (external author)

Publication Date


  • 2014

Citation


  • Gritti, C., Susilo, W., Plantard, T., Liang, K. & Wong, D. (2014). Empowering personal health records with cloud computing: how to encrypt with forthcoming fine-grained policies efficiently. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 5 (4), 3-28.

Scopus Eid


  • 2-s2.0-84920149166

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=4299&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/3283

Number Of Pages


  • 25

Start Page


  • 3

End Page


  • 28

Volume


  • 5

Issue


  • 4

Place Of Publication


  • http://jowua.yolasite.com/current-issue.php