Full Paper View Go Back

Autonomous PHR Sharing: A Patient Centric Scalable and Flexible e-Healthcare Framework

R. Bhavani1 , K. S. Suganya2 , D. Yazhini Priyanka3

1 Department of Computer Science and Engineering, Bannari Amman Institute of Technology, Erode, India.
2 Department of Information Technology, Bannari Amman Institute of Technology, Erode, India.
3 Department of Information Technology, Bannari Amman Institute of Technology, Erode, India.

Section:Research Paper, Product Type: Journal
Vol.6 , Issue.2 , pp.11-14, Apr-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v6i2.1114


Online published on Apr 30, 2018


Copyright © R. Bhavani, K. S. Suganya, D. Yazhini Priyanka . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Bhavani, K. S. Suganya, D. Yazhini Priyanka, “Autonomous PHR Sharing: A Patient Centric Scalable and Flexible e-Healthcare Framework,” International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.11-14, 2018.

MLA Style Citation: R. Bhavani, K. S. Suganya, D. Yazhini Priyanka "Autonomous PHR Sharing: A Patient Centric Scalable and Flexible e-Healthcare Framework." International Journal of Scientific Research in Network Security and Communication 6.2 (2018): 11-14.

APA Style Citation: R. Bhavani, K. S. Suganya, D. Yazhini Priyanka, (2018). Autonomous PHR Sharing: A Patient Centric Scalable and Flexible e-Healthcare Framework. International Journal of Scientific Research in Network Security and Communication, 6(2), 11-14.

BibTex Style Citation:
@article{Bhavani_2018,
author = {R. Bhavani, K. S. Suganya, D. Yazhini Priyanka},
title = {Autonomous PHR Sharing: A Patient Centric Scalable and Flexible e-Healthcare Framework},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2018},
volume = {6},
Issue = {2},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {11-14},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=319},
doi = {https://doi.org/10.26438/ijcse/v6i2.1114}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i2.1114}
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=319
TI - Autonomous PHR Sharing: A Patient Centric Scalable and Flexible e-Healthcare Framework
T2 - International Journal of Scientific Research in Network Security and Communication
AU - R. Bhavani, K. S. Suganya, D. Yazhini Priyanka
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 11-14
IS - 2
VL - 6
SN - 2347-2693
ER -

1405 Views    599 Downloads    389 Downloads
  
  

Abstract :
An explosive growth of information technology and the widespread use of cloud computing in every field had paved the way for Personal Health Record (PHR) Systems in cloud computing. Microsoft Healthvault is the best choice of example which is a online personal health record service provided by the technology giant Microsoft where the users can store, access and maintain their personal records which is shared to the health care providers. Some critics argue that moving personal data application in cloud computing may compromise control over data. Hence the need for a secure PHR systems in cloud. Many frameworks for PHR have been proposed using traditional cryptographic techniques. But they lack in the aspect of efficiency, scalability and suitability required by the PHR systems. And also the multi owner scenario of PHR system does not go in with single owner scenario of traditional cryptographic techniques. Hence we propose a PHR framework where the patients have access control and privacy of their personal record using light weight 64 bit block cipher symmetric encryption algorithm and also divide the patient centric framework into multiple security domains to reduce the key distribution complexity. The proposed scheme is flexible as it allows break glass decisions in case of emergency scenario. But the system lacks integrity which can be ensured by using digital signature algorithm or Elliptic Curve Digital Signature Algorithm (ECDSA) scheme to achieve integrity of the personal health records.

Key-Words / Index Term :
Personal Health Record, cloud computing, Microsoft Health vault, cryptographic techniques, Symmetric Encryption, break glass

References :
[1] Louis Columbus,2018,“Cloud Computing Survey,” Forbes (26thDecember), at http://www.forbes.com/sites/louiscolumbus/2034/32/26/kpmgs-2034-cloud-computing-survey-enterprises-quickly-moving-beyond-cost-reduction-to-customer-driven-results/ , Accessed by 03 April 2018.
[2] Jin, J., Ahn, G.J., Hu, H., Covington, M.J. and Zhang, X., 2009. “Patient-centric Authorization Framework for Sharing Electronic Health Records”. In the Proceedings of SACMAT 09 Proceedings of the 14th ACM symposium on Access control models and technologies pp. 325–334.
[3] Di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi, S., & Samarati, P,2017,” Over-encryption: management of access control evolution on outsourced data”.In the Proceedings of the 33rd international conference on Very large data bases pp. 123-134.
[4] Benaloh, Josh, Melissa Chase, Eric Horvitz, and Kristin Lauter. "Patient controlled encryption: ensuring privacy of electronic medical records." In Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 103-114
[5] Dong, C., Russello, G., & Dulay, N. (2011),”Shared and searchable encrypted data for untrusted servers”, Journal of Computer Security, Vol.19,Issue.3, 367-397.
[6] Yu, S., Wang, C., Ren, K., Lou, W,”Attribute based data sharing with attribute revocation”, In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security ASIACCS 2010 , pp 261-270 .
[7] Li, M., Lou, W., Ren, K.,”Data security and privacy in wireless body area networks”,IEEE Wireless Communications Magazine, Vol.17,Issue.1,2010, pp 51-58.
[8] Goyal, V., Pandey, O., Sahai, A., Waters, B,”Attribute-based encryption for finegrained access control of encrypted data”, In Proceedings of CCS 2006, pp. 89–98.
[9] X. Yao, Y. Lin, Q. Liu and J. Zhang, "Privacy-Preserving Search Over Encrypted Personal Health Record In Multi-Source Cloud," in IEEE Access, Vol. 6, Issue 2,pp. 3809-3823.
[10] V. Indhumathi and V. Prakasham, "On demand security for Personal Health Record in cloud computing,"In Proceedings of International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2015, pp. 1-5.
[11] Sakshi kathuria,"A Survey on Security Provided by Multi-Clouds in Cloud Computing",International Journal of Scientific Research in Network Security and Communication,Vol.6,Issue.1,pp 23-28

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation