Abstract
In today’s world, Cloud computing based health cloud is an effective platform for enhancing e-health productivity, i.e., healthcare professionals can provide medical service by accessing health information on any device in any location at any time. The major challenge faced by a healthcare organization is secure sharing of healthcare data in health cloud among general practitioner, medical services, and insurance firms. In order to overcome this issue, the security of sensitive healthcare data is accomplished with encryption mechanisms. In this research work, the medical data files are encrypted using elliptic curve cryptography algorithm to possess confidentiality and integrity in the healthcare data while sharing data via health cloud. The experimental results exhibits better performance in terms of key generation time, turn-around time, file encryption time, file decryption time, file upload time, file download time, file uploading speed, as well as security overhead. Furthermore, it also securely transmits the healthcare data over health cloud by defending against insider threats.
Similar content being viewed by others
References
Miranda, J., Memon, M., Cabral, J., Ravelo, B., Wagner, S. R., Pedersen, C. F., et al. (2017). Eye on patient care: Continuous health monitoring: Design and implementation of a wireless platform for healthcare applications. IEEE Microwave Magazine, 18(2), 83–94.
Abo-Zahhad, M., Ahmed, S. M., & Elnahas, O. (2014). A wireless emergency telemedicine system for patients monitoring and diagnosis. International Journal of Telemedicine and Applications, 2014, 4.
Jin, Z., & Chen, Y. (2015). Telemedicine in the cloud era: Prospects and challenges. IEEE Pervasive Computing, 14(1), 54–61.
Hsieh, J.-C., & Hsu, M.-W. (2012). A cloud computing based 12-lead ECG telemedicine service. BMC Medical Informatics and Decision Making, 12(1), 77.
Wang, X. A., Ma, J., Xhafa, F., Zhang, M., & Luo, X. (2017). Cost-effective secure E-health cloud system using identity based cryptographic techniques. Future Generation Computer Systems, 67, 242–254.
Ruiz-Zafra, Á., Benghazi, K., Noguera, M., & Garrido, J. L. (2013). Zappa: An open mobile platform to build cloud-based m-health systems. In Ambient intelligence-software and applications (pp. 87–94). Springer.
Bourouis, A., Feham, M., & Bouchachia, A. (2012). A new architecture of a ubiquitous health monitoring system: A prototype of cloud mobile health monitoring system. arXiv:1205.6910.
Li, Z.-R., Chang, E.-C., Huang, K.-H., & Lai, F. (2011). A secure electronic medical record sharing mechanism in the cloud computing platform. In 2011 IEEE 15th international symposium on consumer electronics (ISCE) (pp. 98–103). IEEE.
Wu, R., Ahn, G.-J., & Hu, H. (2012). Secure sharing of electronic health records in clouds. In 2012 8th International conference on collaborative computing: Networking, applications and worksharing (CollaborateCom) (pp. 711–718). IEEE.
Liu, D.-l., Chen, Y.-p., & Huai-ping, Z. (2010). Secure applications of RSA system in the electronic commerce. In 2010 International conference on future information technology and management engineering (FITME) (Vol. 1, pp. 86–89). IEEE.
Gola, K. K., Gupta, B., & Iqbal, Z. (2014). Modified RSA digital signature scheme for data confidentiality. International Journal of Computer Applications, 106(13), 13–16.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications, 3(4), 1922–1926.
Rahumed, A., Chen, H. C., Tang, Y., Lee, P. P., & Lui, J. C. (2011). A secure cloud backup system with assured deletion and version control. In 2011 40th International conference on parallel processing workshops (ICPPW) (pp. 160–167). IEEE.
Xu, L., Wu, X., & Zhang, X. (2012). CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proceedings of the 7th ACM symposium on information, computer and communications security, 2012 (pp 87–88). ACM.
Seo, S.-H., Nabeel, M., Ding, X., & Bertino, E. (2014). An efficient certificateless encryption for secure data sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 26(9), 2107–2119.
Itani, W., Kayssi, A., & Chehab, A. (2010). Energy-efficient incremental integrity for securing storage in mobile cloud computing. In 2010 International conference on energy aware computing (ICEAC) (pp. 1–2). IEEE.
Khan, A. N., Kiah, M. M., Madani, S. A., Ali, M., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624–651.
Chen, Y.-R., & Tzeng, W.-G. (2012). Efficient and provably-secure group key management scheme using key derivation. In 2012 IEEE 11th International conference on trust, security and privacy in computing and communications (TrustCom) (pp. 295–302). IEEE.
Chen, Y.-R., Tygar, J., & Tzeng, W.-G. (2011). Secure group key management using uni-directional proxy re-encryption schemes. In INFOCOM, 2011 proceedings IEEE (pp. 1952–1960). IEEE.
Ali, M., Dhamotharan, R., Khan, E., Khan, S. U., Vasilakos, A. V., Li, K., et al. (2017). SeDaSC: Secure data sharing in clouds. IEEE Systems Journal, 11(2), 395–404.
Zhang, L., Wu, Q., Mu, Y., & Zhang, J. (2016). Privacy-preserving and secure sharing of PHR in the cloud. Journal of Medical Systems, 40(12), 267.
Rao, Y. S. (2017). A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Generation Computer Systems, 67, 133–151.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sri Vigna Hema, V., Kesavan, R. ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment. Wireless Pers Commun 108, 1021–1035 (2019). https://doi.org/10.1007/s11277-019-06450-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06450-7