Scalable and enhanced key-aggregate cryptosystem in cloud-based intelligent health monitoring system

  • Authors

    • K. Arumugam PhD Research Scholar, PG & Research Department of Computer Science, Government Arts College, Coimbatore- 641 018
    • Dr. P. Sumathi Assistant Professor, Department of Information Technology, Government Arts College, Coimbatore- 641 018
    2019-02-26
    https://doi.org/10.14419/ijet.v7i4.20057
  • Cloud Based Intelligent Health Monitoring System (CIHMS), Cloud Computing, Data Sharing, Healthcare Instructions, Key-Aggregate Encryption.
  • Cloud based Intelligent Health Monitoring system (CIHMS) is a fashionable technology that enables the patients to retrieve health care details directly without visiting the hospital. This can be accomplished by storing the health care details of the patients in the cloud environment. But securing the healthcare details is a challenging problem. In this manuscript, Scalable and Enhanced Key-Aggregate Cryptosystem (SE-KAC) is proposed to provide efficient security for healthcare details. This method addresses the prob-lem of leakage of sensitive information and designs a Secure Cloud-based Intelligent Health Monitoring system for providing the security of the concerned parties and their data. This method allows the patient and healthcare institutions (HIs) to store the health and medical prescription data in encrypted format. For encrypting the data, the double encryption method with ciphertext-id called classes for improving the security. The key owner has a master secret key that is used to extract the secret keys for different classes. The extracted key is aggregated and sends as a single aggregate key to the patient for the decryption process. Elliptic curve is used to generate the ciphertext-id dynamically depends on the data size. An experimental result shows that proposed SE-KAC achieves high security and less complexity.

     

     

  • References

    1. [1] Goldschmidt PG (2005), HIT and MIS: implications of health information technology and medical information systems. Communications of the ACM, 48(10), pp. 68-74. https://doi.org/10.1145/1089107.1089141.

      [2] Davidson E, & Heslinga D (2006), Bridging the IT adoption gap for small physician practices: An action research study on electronic health records. Information Systems Management, 24(1), pp. 15-28. https://doi.org/10.1080/10580530601036786.

      [3] Klein R (2007), An empirical examination of patient-physician portal acceptance. European Journal of Information Systems, 16(6), pp. 751-760. https://doi.org/10.1057/palgrave.ejis.3000719.

      [4] Lounis A, Hadjidj, A, Bouabdallah A, and Challal Y (2012), Secure and Scalable Cloud-based Architecture for e-Health Wireless Sensor Networks, In IEEE Conference on Computer Communications and Networks (ICCCN), pp. 1 – 7. https://doi.org/10.1109/ICCCN.2012.6289252.

      [5] Chu CK, Chow SS, Tzeng WG, Zhou J, and Deng RH (2014), Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE transactions on parallel and distributed systems, 25(2), pp. 468-477. https://doi.org/10.1109/TPDS.2013.112.

      [6] Lin H, Shao J, Zhang C, and Fang Y (2013), CAM: cloud-assisted privacy preserving mobile health monitoring. IEEE Transactions on Information Forensics and Security, 8(6), pp. 985-997. https://doi.org/10.1109/TIFS.2013.2255593.

      [7] Wan J, Zou C, Ullah S, Lai CF, Zhou M, and Wang X (2013), Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Network, 27(5), pp. 56-61. https://doi.org/10.1109/MNET.2013.6616116.

      [8] Khan FA, Ali A, Abbas H, and Haldar NAH (2014), A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks. Procedia Computer Science, 34, pp. 511-517. https://doi.org/10.1016/j.procs.2014.07.058.

      [9] Page A, Kocabas O, Ames S, Venkitasubramaniam M, and Soyata T (2014), Cloud-based secure health monitoring: Optimizing fully-homomorphic encryption for streaming algorithms. In Globecom Workshops (GC Wkshps), pp. 48-52. https://doi.org/10.1109/GLOCOMW.2014.7063384.

      [10] Pawar SS, and Phursule RN (2014), Protect integrity of data in cloud assisted privacy preserving mobile health monitoring. International Journal of Information & Computation Technology, 4(13), pp. 1329-1334.

      [11] Wang C, Zhang B, Ren K, Roveda JM, Chen CW, and Xu Z (2014), A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing. In INFOCOM, 2014 Proceedings IEEE, pp. 2130-2138. https://doi.org/10.1109/INFOCOM.2014.6848155.

      [12] Lounis A, Hadjidj A, Bouabdallah A, and Challal Y (2012), Secure and scalable cloud-based architecture for e-health wireless sensor networks. In 21st international conference on Computer communications and networks (ICCCN), IEEE, pp. 1-7. https://doi.org/10.1109/ICCCN.2012.6289252.

  • Downloads

  • How to Cite

    Arumugam, K., & P. Sumathi, D. (2019). Scalable and enhanced key-aggregate cryptosystem in cloud-based intelligent health monitoring system. International Journal of Engineering & Technology, 7(4), 4823-4828. https://doi.org/10.14419/ijet.v7i4.20057