SlideShare a Scribd company logo
Abstract
 Electronic healthcare (eHealth) systems have replaced paper-based
medical systems due to the attractive features such as universal
accessibility, high accuracy, and low cost.
 As a major component of eHealth systems, mobile healthcare (mHealth)
applies mobile devices, such as smartphones and tablets, to enable patient-
to-physician and patient-to-patient communications for better healthcare
and quality of life (QoL).
 Unfortunately, patients’ concerns on potential leakage of personal health
records (PHRs) is the biggest stumbling block. In current eHealth/mHealth
networks, patients’ medical records are usually associated with a set of
attributes like existing symptoms and undergoing treatments based on the
information collected from portable devices.
 To guarantee the authenticity of those attributes, PHRs should be
verifiable.
 However, due to the link ability between identities and PHRs, existing
mHealth systems fail to preserve patient identity privacy while
providing medical services.
 To solve this problem, we propose a decentralized system that leverages
users’ verifiable attributes to authenticate each other while preserving
attribute and identity privacy.
ABOUT THE SYSTEM
 Here, we endeavor to study the patientcentric, secure sharing of PHRs
stored on semi-trusted servers, and focus on addressing the
complicated and challenging key management issues.
 In order to protect the personal health data stored on a semi-trusted
server, we adopt attribute-based encryption (ABE) as the main
encryption primitive.
 Using ABE, access policies are expressed based on the attributes of
users or data, which enables a patient to selectively share her PHR
among a set of users by encrypting the file under a set of attributes,
without the need to know a complete list of users.
 The complexities per encryption, key generation and decryption are
only linear with the number of attributes involved.
 However, to integrate ABE into a large-scale PHR system, important
issues such as key management scalability, dynamic policy updates,
and efficient on-demand revocation are non-trivial to solve, and
remain largely open up-to-date.
There are several main additional contributions:
 (1) We clarify and extend our usage of MA-ABE in the public domain,
and formally show how and which types of user-defined file access
policies are realized.
 (2) We clarify the proposed revocable MA-ABE scheme, and provide a
formal security proof for it.
 (3) We carry out both real-world experiments and simulations to
evaluate the performance of the proposed solution in this paper.
SYSTEM ARCHITECTURE
 WIDELY deployed electronic healthcare (eHealth) systems have improved
people’s daily life compared with traditional paper-based systems for its
extraordinary advantages, such as higher efficiency, better accuracy, and
broader availability.
 For most mHealth systems, patients use sensors, implantable medical devices
(IMDs), and mobile phones to collect personal health records (PHRs), then
send medical data to the designated healthcare infrastructure to obtain
physicians’ diagnosis via wireless interfaces.
 Possible solution leads us to consider the possibility of separating multiple
attributes from a single identity, and allows users to mutually authenticate each
other using their attributes
SYSTEM DESIGN
A.DATA FLOW DIAGRAM
B.USE CASE DIAGRAM
CONCLUSION
 we have proposed a novel framework of secure sharing of personal
health records in cloud computing.
 Considering partially trustworthy cloud servers, we argue that to fully
realize the patient-centric concept, patients shall have complete
control of their own privacy through encrypting their PHR files to allow
fine-grained access.
 The framework addresses the unique challenges brought by multiple
PHR owners and users, in that we greatly reduce the complexity of key
management while enhance the privacy guarantees compared with
previous works.
 Furthermore, we enhance an existing MA-ABE scheme to handle
efficient and on-demand user revocation, and prove its security.
Through implementation and simulation, we show that our solution is
both scalable and efficient.
THANK YOU

More Related Content

What's hot

CORAnet challenge presentation v2
CORAnet   challenge presentation v2CORAnet   challenge presentation v2
CORAnet challenge presentation v2
Jonathan Chashper
 
Mobile monday mhealth
Mobile monday mhealthMobile monday mhealth
Mobile monday mhealth
Joe Drumgoole
 
SureScripts PowerPoint Template and Network Diagram
SureScripts PowerPoint Template and Network DiagramSureScripts PowerPoint Template and Network Diagram
SureScripts PowerPoint Template and Network Diagram
Modicum
 
Patient Data Exchange Server
Patient Data Exchange ServerPatient Data Exchange Server
Patient Data Exchange Server
watchdog
 

What's hot (20)

Health Application Integration with (Electronic Health Records) EHR systems
Health Application Integration with (Electronic Health Records) EHR systemsHealth Application Integration with (Electronic Health Records) EHR systems
Health Application Integration with (Electronic Health Records) EHR systems
 
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTIntegration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
 
MU3 Certification Handbook - Nalashaa Experiences
MU3 Certification Handbook - Nalashaa ExperiencesMU3 Certification Handbook - Nalashaa Experiences
MU3 Certification Handbook - Nalashaa Experiences
 
HITECH Health IT Legislation: Opportunities for the DMAA Community
HITECH Health IT Legislation: Opportunities for the DMAA CommunityHITECH Health IT Legislation: Opportunities for the DMAA Community
HITECH Health IT Legislation: Opportunities for the DMAA Community
 
CORAnet challenge presentation v2
CORAnet   challenge presentation v2CORAnet   challenge presentation v2
CORAnet challenge presentation v2
 
Universal Identity Management Model Based on Anonymous Credentilals
Universal Identity Management Model Based on Anonymous CredentilalsUniversal Identity Management Model Based on Anonymous Credentilals
Universal Identity Management Model Based on Anonymous Credentilals
 
Aligning it
Aligning itAligning it
Aligning it
 
FHIR Adoption Framework for Payers
FHIR Adoption Framework for PayersFHIR Adoption Framework for Payers
FHIR Adoption Framework for Payers
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
 
7 PROVEN REASONS THAT SHOWS YOU WHY FHIR IS BETTER
7 PROVEN REASONS THAT SHOWS YOU WHY FHIR IS BETTER7 PROVEN REASONS THAT SHOWS YOU WHY FHIR IS BETTER
7 PROVEN REASONS THAT SHOWS YOU WHY FHIR IS BETTER
 
EMR and EDC Integration
EMR and EDC IntegrationEMR and EDC Integration
EMR and EDC Integration
 
Mobile monday mhealth
Mobile monday mhealthMobile monday mhealth
Mobile monday mhealth
 
SureScripts PowerPoint Template and Network Diagram
SureScripts PowerPoint Template and Network DiagramSureScripts PowerPoint Template and Network Diagram
SureScripts PowerPoint Template and Network Diagram
 
arocya.com - Healthcare USP
arocya.com - Healthcare USParocya.com - Healthcare USP
arocya.com - Healthcare USP
 
Patient Data Exchange Server
Patient Data Exchange ServerPatient Data Exchange Server
Patient Data Exchange Server
 
BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf
 
Medical management system brochure
Medical management system brochureMedical management system brochure
Medical management system brochure
 
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
CMS BlueButton On FHIR for Researchers - Presentation to NIH and PCORI Resear...
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
 
Enhancing EMR Systems Using Cloud
Enhancing EMR Systems Using CloudEnhancing EMR Systems Using Cloud
Enhancing EMR Systems Using Cloud
 

Similar to Protecting Sensitive Data

Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
ecway
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
Ecway Technologies
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
ecway
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
Ecway Technologies
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
ecwayerode
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
ecwayerode
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
ecway
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Ecway Technologies
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Dotnet  scalable and secure sharing of personal health records in cloud compu...Dotnet  scalable and secure sharing of personal health records in cloud compu...
Dotnet scalable and secure sharing of personal health records in cloud compu...
Ecway Technologies
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Dotnet  scalable and secure sharing of personal health records in cloud compu...Dotnet  scalable and secure sharing of personal health records in cloud compu...
Dotnet scalable and secure sharing of personal health records in cloud compu...
Ecway Technologies
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
IJERA Editor
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Ecway2004
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Ecwayt
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Ecwayt
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Ecwaytech
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Ecwaytechnoz
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Ecwayt
 

Similar to Protecting Sensitive Data (20)

Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Java scalable and secure sharing of personal health records in cloud computi...
Java  scalable and secure sharing of personal health records in cloud computi...Java  scalable and secure sharing of personal health records in cloud computi...
Java scalable and secure sharing of personal health records in cloud computi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Dotnet  scalable and secure sharing of personal health records in cloud compu...Dotnet  scalable and secure sharing of personal health records in cloud compu...
Dotnet scalable and secure sharing of personal health records in cloud compu...
 
Dotnet scalable and secure sharing of personal health records in cloud compu...
Dotnet  scalable and secure sharing of personal health records in cloud compu...Dotnet  scalable and secure sharing of personal health records in cloud compu...
Dotnet scalable and secure sharing of personal health records in cloud compu...
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 

Recently uploaded

Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
AbrahamGadissa
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
Atif Razi
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
Kamal Acharya
 

Recently uploaded (20)

Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 
Introduction to Casting Processes in Manufacturing
Introduction to Casting Processes in ManufacturingIntroduction to Casting Processes in Manufacturing
Introduction to Casting Processes in Manufacturing
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 

Protecting Sensitive Data

  • 1.
  • 2.
  • 3. Abstract  Electronic healthcare (eHealth) systems have replaced paper-based medical systems due to the attractive features such as universal accessibility, high accuracy, and low cost.  As a major component of eHealth systems, mobile healthcare (mHealth) applies mobile devices, such as smartphones and tablets, to enable patient- to-physician and patient-to-patient communications for better healthcare and quality of life (QoL).  Unfortunately, patients’ concerns on potential leakage of personal health records (PHRs) is the biggest stumbling block. In current eHealth/mHealth networks, patients’ medical records are usually associated with a set of attributes like existing symptoms and undergoing treatments based on the information collected from portable devices.
  • 4.  To guarantee the authenticity of those attributes, PHRs should be verifiable.  However, due to the link ability between identities and PHRs, existing mHealth systems fail to preserve patient identity privacy while providing medical services.  To solve this problem, we propose a decentralized system that leverages users’ verifiable attributes to authenticate each other while preserving attribute and identity privacy.
  • 5. ABOUT THE SYSTEM  Here, we endeavor to study the patientcentric, secure sharing of PHRs stored on semi-trusted servers, and focus on addressing the complicated and challenging key management issues.  In order to protect the personal health data stored on a semi-trusted server, we adopt attribute-based encryption (ABE) as the main encryption primitive.  Using ABE, access policies are expressed based on the attributes of users or data, which enables a patient to selectively share her PHR among a set of users by encrypting the file under a set of attributes, without the need to know a complete list of users.
  • 6.  The complexities per encryption, key generation and decryption are only linear with the number of attributes involved.  However, to integrate ABE into a large-scale PHR system, important issues such as key management scalability, dynamic policy updates, and efficient on-demand revocation are non-trivial to solve, and remain largely open up-to-date.
  • 7. There are several main additional contributions:  (1) We clarify and extend our usage of MA-ABE in the public domain, and formally show how and which types of user-defined file access policies are realized.  (2) We clarify the proposed revocable MA-ABE scheme, and provide a formal security proof for it.  (3) We carry out both real-world experiments and simulations to evaluate the performance of the proposed solution in this paper.
  • 9.  WIDELY deployed electronic healthcare (eHealth) systems have improved people’s daily life compared with traditional paper-based systems for its extraordinary advantages, such as higher efficiency, better accuracy, and broader availability.  For most mHealth systems, patients use sensors, implantable medical devices (IMDs), and mobile phones to collect personal health records (PHRs), then send medical data to the designated healthcare infrastructure to obtain physicians’ diagnosis via wireless interfaces.  Possible solution leads us to consider the possibility of separating multiple attributes from a single identity, and allows users to mutually authenticate each other using their attributes
  • 12. CONCLUSION  we have proposed a novel framework of secure sharing of personal health records in cloud computing.  Considering partially trustworthy cloud servers, we argue that to fully realize the patient-centric concept, patients shall have complete control of their own privacy through encrypting their PHR files to allow fine-grained access.  The framework addresses the unique challenges brought by multiple PHR owners and users, in that we greatly reduce the complexity of key management while enhance the privacy guarantees compared with previous works.  Furthermore, we enhance an existing MA-ABE scheme to handle efficient and on-demand user revocation, and prove its security. Through implementation and simulation, we show that our solution is both scalable and efficient.