Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records

  title={Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records},
  author={Luan Ibraimi and Qiang Tang and Pieter H. Hartel and Willem Jonker},
  journal={Int. J. Comput. Model. Algorithms Medicine},
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an inappropriate disclosure may cause serious problems to an individual. Therefore commercial Web-based PHR systems have to ensure that the patient health data is secured using state-of-the-art mechanisms. In current commercial PHR systems, even though patients have the power to define the access control policy on who… 

Figures from this paper

Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption
The BF-CP-ABE technique is designed to be selective secure under an Indistinguishable-Chosen Plaintext attack and the simulation results show that the communication overhead is significantly reduced with the adopted LSSS access policy.
Cryptographically enforced distributed data access control
The main idea of this approach is to map an access control policy into an encryption key, and then to encrypt the data under the encryption key such that only authorized users who possess a decryption key can access the data in clear.
Privacy for the Personal Data Vault
This thesis proposes three different privacy enhancing models, all based around the use of the Sticky Policy (policy attached to data, describing usage restrictions) paradigm, and proposes a novel approach that turns a simple Distributed Hash Table (DHT) into a privacy enforcing platform.
Preface Pattern Recognition in Medicine Association Rule Mining
  • Medicine, Computer Science
  • 2013
Some of the recent research on health information technology within the context of the following areas: pattern recognition in medicine, privacy and security issues in healthcare, and clinical decision support are discussed.
Data Mining to Examine the Treatment of Osteomyelitis
It is shown how disparate datasets such as inpatients, outpatients and RX datasets can be merged to examine the relationship of antibiotics to disease treatment and developed the necessary SAS coding required to perform the preprocessing steps.
Genetic Algorithms for Small Enterprises Default Prediction: Empirical Evidence from Italy
Company default prediction is a widely studied topic as it has a significant impact on banks and firms. Moreover, nowadays, due to the global financial crisis, there is a need to use even more
Dynamic Assignment of Crew Reserve in Airlines
A low cost approach is proposed to provide on-line efficient solutions to face perturbed operating conditions and uses a dynamic programming approach for the duties scheduling problem and shows good potential acceptability by the operations staff.
Development of Artificial Mouths for In Vitro Studies of Aroma from Liquid and Solid Foods
Food is composed mainly of macromolecules, vitamins and minerals, but also of small quantities of volatile molecules without nutritional value. These compounds are responsible for the perception of
Securing Healthcare Records Using Proxy Re-Encryption Scheme in Cloud
An algorithm is proposed and implemented based ElGamalpublic key cryptographic method, this approach allows different re-encryptions for different users through proxy re- Encryption, which is highly suitable for PHRS for different health centers.


Ciphertext-Policy Attribute-Based Encryption
A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Attribute-based encryption for fine-grained access control of encrypted data
This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Identity-Based Cryptosystems and Signature Schemes
  • A. Shamir
  • Computer Science, Mathematics
  • 1984
A novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other’s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Attribute based proxy re-encryption with delegating capabilities
Another kind of key delegating capability in the scheme is developed and the proposed scheme is proved selective-structure chosen plaintext secure and master key secure without random oracles.
Identity-Based Proxy Re-encryption
This paper addresses the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another, and develops two schemes that are compatible with current IBE deployments and do not require any extra work from the IBE trusted-party key generator.
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses
The AL-TFP system allows the proxy decryptor to do decryption directly without any ciphertext transformation from the original decryptor, so that it can release theOriginal decryptor more efficiently from a large amount of decrypting operations.
Improved proxy re-encryption schemes with applications to secure distributed storage
Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
An Interpretation of Identity-Based Cryptography
This paper introduces the concept of IBC by explaining some basic cryptographic primitives, such as identity-based encryption, signatures, combined encryption/ signing and key-agreement, and introduces two types of implementation techniques, which are based on integer factorization and discrete logarithm from pairings respectively.
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
Two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model are constructed.
Fuzzy Identity-Based Encryption
Two constructions of Fuzzy IBE schemes can be viewed as an Identity-Based Encryption of a message under several attributes that compose a (fuzzy) identity and are both error-tolerant and secure against collusion attacks.