{"title":"A Patient-Centric Access Control Scheme for Personal Health Records in the Cloud","authors":"Kuo-Hsuan Huang, En-Chi Chang, Shao-Jui Wang","doi":"10.1109/ICNDC.2013.19","DOIUrl":null,"url":null,"abstract":"In this paper, we describe a scheme that enables patients to exercise complete control over their personal health records (PHR) stored in the cloud whilst also maintaining confidentiality of their data. The design goals of the proposed scheme include: (1) confidentiality of health data, (2) integrity of health data, (3) authenticity of health data, (4) patient-centric fine-grained access control, and (5) revocation of access control. To achieve these goals, we primarily utilize techniques such as Conditional Proxy Re-Encryption, the Advanced Encryption Standard, and the RSA cryptosystem. In our proposed scheme, patients can easily authorize access privileges for their PHR data for various users. Furthermore, this scheme also provides flexible key management and an efficient encryption mechanism.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Fourth International Conference on Networking and Distributed Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNDC.2013.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
In this paper, we describe a scheme that enables patients to exercise complete control over their personal health records (PHR) stored in the cloud whilst also maintaining confidentiality of their data. The design goals of the proposed scheme include: (1) confidentiality of health data, (2) integrity of health data, (3) authenticity of health data, (4) patient-centric fine-grained access control, and (5) revocation of access control. To achieve these goals, we primarily utilize techniques such as Conditional Proxy Re-Encryption, the Advanced Encryption Standard, and the RSA cryptosystem. In our proposed scheme, patients can easily authorize access privileges for their PHR data for various users. Furthermore, this scheme also provides flexible key management and an efficient encryption mechanism.