Title | ||
---|---|---|
Secure sharing of mobile personal healthcare records using certificateless proxy re‐encryption in cloud |
Abstract | ||
---|---|---|
AbstractAbstractThe ubiquitous and timely access to personal health records help physicians to take critical decisions and save lives. Cloud computing has a potential to provide ubiquitous and on‐demand instant access to common pool of shared resources and services to various stakeholders involved in electronic healthcare industry such as patients, healthcare professionals, insurance companies, etc. The speedy evolution and adoption of cloud computing in electronic healthcare systems have inevitably raised concerns enveloping outsourced data in a myriad of safety issues. In this paper, cryptanalysis of Qin's scheme is performed breaching confidentiality of their scheme. We further proposed a lightweight and pairing free single‐hop unidirectional certificateless proxy re‐encryption scheme based on elliptic curves for secure sharing of mobile personal health records with public cloud competent for low‐power mobile devices. In certificateless proxy re‐encryption, patients encrypt the data with their public keys before outsourcing to the cloud and cloud resident semitrusted proxy further re‐encrypts into ciphertext under intended recipient's public key without learning anything about encrypted message. We prove its security through formal analysis against chosen ciphertext attack in the random oracle model. Our proposed scheme is more efficient and suitable for low‐power mobile devices in comparison with existing schemes. View Figure The ubiquitous and timely access to mobile personal health records (mPHRs) help physicians to take critical care decisions and save lives. Secure data sharing is an important concern when we have abundant e‐health data stored in data centers. A lightweight pairing‐free certificateless proxy re‐encryption scheme has been proposed for secure sharing of mPHRs data with public cloud. The owner encrypt data with their public keys before outsourcing to cloud and cloud resident proxy further re‐encrypts into ciphertext under recipient's public key without seeing the message. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1002/ett.3309 | Periodicals |
Field | DocType | Volume |
Health care,Computer security,Computer science,Proxy re-encryption,Cloud computing | Journal | 29 |
Issue | ISSN | Citations |
6 | 2161-3915 | 0 |
PageRank | References | Authors |
0.34 | 21 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Tarunpreet Bhatia | 1 | 12 | 3.99 |
Anil K. Verma | 2 | 12 | 2.72 |
Gaurav Sharma | 3 | 28 | 9.71 |