Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In today’s world, Cloud computing based health cloud is an effective platform for enhancing e-health productivity, i.e., healthcare professionals can provide medical service by accessing health information on any device in any location at any time. The major challenge faced by a healthcare organization is secure sharing of healthcare data in health cloud among general practitioner, medical services, and insurance firms. In order to overcome this issue, the security of sensitive healthcare data is accomplished with encryption mechanisms. In this research work, the medical data files are encrypted using elliptic curve cryptography algorithm to possess confidentiality and integrity in the healthcare data while sharing data via health cloud. The experimental results exhibits better performance in terms of key generation time, turn-around time, file encryption time, file decryption time, file upload time, file download time, file uploading speed, as well as security overhead. Furthermore, it also securely transmits the healthcare data over health cloud by defending against insider threats.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Miranda, J., Memon, M., Cabral, J., Ravelo, B., Wagner, S. R., Pedersen, C. F., et al. (2017). Eye on patient care: Continuous health monitoring: Design and implementation of a wireless platform for healthcare applications. IEEE Microwave Magazine, 18(2), 83–94.

    Article  Google Scholar 

  2. Abo-Zahhad, M., Ahmed, S. M., & Elnahas, O. (2014). A wireless emergency telemedicine system for patients monitoring and diagnosis. International Journal of Telemedicine and Applications, 2014, 4.

    Article  Google Scholar 

  3. Jin, Z., & Chen, Y. (2015). Telemedicine in the cloud era: Prospects and challenges. IEEE Pervasive Computing, 14(1), 54–61.

    Article  Google Scholar 

  4. Hsieh, J.-C., & Hsu, M.-W. (2012). A cloud computing based 12-lead ECG telemedicine service. BMC Medical Informatics and Decision Making, 12(1), 77.

    Article  MathSciNet  Google Scholar 

  5. Wang, X. A., Ma, J., Xhafa, F., Zhang, M., & Luo, X. (2017). Cost-effective secure E-health cloud system using identity based cryptographic techniques. Future Generation Computer Systems, 67, 242–254.

    Article  Google Scholar 

  6. Ruiz-Zafra, Á., Benghazi, K., Noguera, M., & Garrido, J. L. (2013). Zappa: An open mobile platform to build cloud-based m-health systems. In Ambient intelligence-software and applications (pp. 87–94). Springer.

  7. Bourouis, A., Feham, M., & Bouchachia, A. (2012). A new architecture of a ubiquitous health monitoring system: A prototype of cloud mobile health monitoring system. arXiv:1205.6910.

  8. Li, Z.-R., Chang, E.-C., Huang, K.-H., & Lai, F. (2011). A secure electronic medical record sharing mechanism in the cloud computing platform. In 2011 IEEE 15th international symposium on consumer electronics (ISCE) (pp. 98–103). IEEE.

  9. Wu, R., Ahn, G.-J., & Hu, H. (2012). Secure sharing of electronic health records in clouds. In 2012 8th International conference on collaborative computing: Networking, applications and worksharing (CollaborateCom) (pp. 711–718). IEEE.

  10. Liu, D.-l., Chen, Y.-p., & Huai-ping, Z. (2010). Secure applications of RSA system in the electronic commerce. In 2010 International conference on future information technology and management engineering (FITME) (Vol. 1, pp. 86–89). IEEE.

  11. Gola, K. K., Gupta, B., & Iqbal, Z. (2014). Modified RSA digital signature scheme for data confidentiality. International Journal of Computer Applications, 106(13), 13–16.

    Google Scholar 

  12. Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications, 3(4), 1922–1926.

    Google Scholar 

  13. Rahumed, A., Chen, H. C., Tang, Y., Lee, P. P., & Lui, J. C. (2011). A secure cloud backup system with assured deletion and version control. In 2011 40th International conference on parallel processing workshops (ICPPW) (pp. 160–167). IEEE.

  14. Xu, L., Wu, X., & Zhang, X. (2012). CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proceedings of the 7th ACM symposium on information, computer and communications security, 2012 (pp 87–88). ACM.

  15. Seo, S.-H., Nabeel, M., Ding, X., & Bertino, E. (2014). An efficient certificateless encryption for secure data sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 26(9), 2107–2119.

    Article  Google Scholar 

  16. Itani, W., Kayssi, A., & Chehab, A. (2010). Energy-efficient incremental integrity for securing storage in mobile cloud computing. In 2010 International conference on energy aware computing (ICEAC) (pp. 1–2). IEEE.

  17. Khan, A. N., Kiah, M. M., Madani, S. A., Ali, M., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624–651.

    Article  Google Scholar 

  18. Chen, Y.-R., & Tzeng, W.-G. (2012). Efficient and provably-secure group key management scheme using key derivation. In 2012 IEEE 11th International conference on trust, security and privacy in computing and communications (TrustCom) (pp. 295–302). IEEE.

  19. Chen, Y.-R., Tygar, J., & Tzeng, W.-G. (2011). Secure group key management using uni-directional proxy re-encryption schemes. In INFOCOM, 2011 proceedings IEEE (pp. 1952–1960). IEEE.

  20. Ali, M., Dhamotharan, R., Khan, E., Khan, S. U., Vasilakos, A. V., Li, K., et al. (2017). SeDaSC: Secure data sharing in clouds. IEEE Systems Journal, 11(2), 395–404.

    Article  Google Scholar 

  21. Zhang, L., Wu, Q., Mu, Y., & Zhang, J. (2016). Privacy-preserving and secure sharing of PHR in the cloud. Journal of Medical Systems, 40(12), 267.

    Article  Google Scholar 

  22. Rao, Y. S. (2017). A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Generation Computer Systems, 67, 133–151.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Sri Vigna Hema.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sri Vigna Hema, V., Kesavan, R. ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment. Wireless Pers Commun 108, 1021–1035 (2019). https://doi.org/10.1007/s11277-019-06450-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06450-7

Keywords