Enhanced timing enabled proxy re-encryption model for E-health data in the public cloud

Richa Bhateja, Naman Saxena, Debi Prasanna Acharjya

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The advancements made in cloud applications attracts the healthcare society. The analysis over Electronic Health Record (EHR) gains much importance among the research communities. As EHR contains sensitive information, the need of security and privacy is to be analyzed effectively. The services like outsourcing and increased computation has enhanced the usage of the digital technologies. The digital data interconnects with different network devices which lead to the study of reliability, scalability and security. Security is the major part of the outsourced databases. Prior works like searchable encryption and proxy re-encryption have been introduced by research communities. Still, the security requirements of the healthcare application are not yet achieved. Notwithstanding, prior searching encryption degrades in terms of storage computation. In this paper, we have proposed timing enabled proxy reencryption system that permits users to access the data under certain time period T. Each identified user is defined with set of attributes and valid time period T. Security analysis in terms of decryption key compromised, Expiration of identity, conjunctive based similarity keyword search and lessened complexity of key update phase have been studied.

Original languageEnglish
Title of host publication2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2040-2044
Number of pages5
Volume2017-January
ISBN (Electronic)9781509063673
DOIs
Publication statusPublished - 30-11-2017
Externally publishedYes
Event2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017 - Manipal, Mangalore, India
Duration: 13-09-201716-09-2017

Conference

Conference2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
CountryIndia
CityManipal, Mangalore
Period13-09-1716-09-17

Fingerprint

Cryptography
Health
Outsourcing
Scalability

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Cite this

Bhateja, R., Saxena, N., & Acharjya, D. P. (2017). Enhanced timing enabled proxy re-encryption model for E-health data in the public cloud. In 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017 (Vol. 2017-January, pp. 2040-2044). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICACCI.2017.8126145
Bhateja, Richa ; Saxena, Naman ; Acharjya, Debi Prasanna. / Enhanced timing enabled proxy re-encryption model for E-health data in the public cloud. 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Vol. 2017-January Institute of Electrical and Electronics Engineers Inc., 2017. pp. 2040-2044
@inproceedings{f0e18f09c7c8427b83f6da0bba752b0c,
title = "Enhanced timing enabled proxy re-encryption model for E-health data in the public cloud",
abstract = "The advancements made in cloud applications attracts the healthcare society. The analysis over Electronic Health Record (EHR) gains much importance among the research communities. As EHR contains sensitive information, the need of security and privacy is to be analyzed effectively. The services like outsourcing and increased computation has enhanced the usage of the digital technologies. The digital data interconnects with different network devices which lead to the study of reliability, scalability and security. Security is the major part of the outsourced databases. Prior works like searchable encryption and proxy re-encryption have been introduced by research communities. Still, the security requirements of the healthcare application are not yet achieved. Notwithstanding, prior searching encryption degrades in terms of storage computation. In this paper, we have proposed timing enabled proxy reencryption system that permits users to access the data under certain time period T. Each identified user is defined with set of attributes and valid time period T. Security analysis in terms of decryption key compromised, Expiration of identity, conjunctive based similarity keyword search and lessened complexity of key update phase have been studied.",
author = "Richa Bhateja and Naman Saxena and Acharjya, {Debi Prasanna}",
year = "2017",
month = "11",
day = "30",
doi = "10.1109/ICACCI.2017.8126145",
language = "English",
volume = "2017-January",
pages = "2040--2044",
booktitle = "2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Bhateja, R, Saxena, N & Acharjya, DP 2017, Enhanced timing enabled proxy re-encryption model for E-health data in the public cloud. in 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. vol. 2017-January, Institute of Electrical and Electronics Engineers Inc., pp. 2040-2044, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017, Manipal, Mangalore, India, 13-09-17. https://doi.org/10.1109/ICACCI.2017.8126145

Enhanced timing enabled proxy re-encryption model for E-health data in the public cloud. / Bhateja, Richa; Saxena, Naman; Acharjya, Debi Prasanna.

2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Vol. 2017-January Institute of Electrical and Electronics Engineers Inc., 2017. p. 2040-2044.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Enhanced timing enabled proxy re-encryption model for E-health data in the public cloud

AU - Bhateja, Richa

AU - Saxena, Naman

AU - Acharjya, Debi Prasanna

PY - 2017/11/30

Y1 - 2017/11/30

N2 - The advancements made in cloud applications attracts the healthcare society. The analysis over Electronic Health Record (EHR) gains much importance among the research communities. As EHR contains sensitive information, the need of security and privacy is to be analyzed effectively. The services like outsourcing and increased computation has enhanced the usage of the digital technologies. The digital data interconnects with different network devices which lead to the study of reliability, scalability and security. Security is the major part of the outsourced databases. Prior works like searchable encryption and proxy re-encryption have been introduced by research communities. Still, the security requirements of the healthcare application are not yet achieved. Notwithstanding, prior searching encryption degrades in terms of storage computation. In this paper, we have proposed timing enabled proxy reencryption system that permits users to access the data under certain time period T. Each identified user is defined with set of attributes and valid time period T. Security analysis in terms of decryption key compromised, Expiration of identity, conjunctive based similarity keyword search and lessened complexity of key update phase have been studied.

AB - The advancements made in cloud applications attracts the healthcare society. The analysis over Electronic Health Record (EHR) gains much importance among the research communities. As EHR contains sensitive information, the need of security and privacy is to be analyzed effectively. The services like outsourcing and increased computation has enhanced the usage of the digital technologies. The digital data interconnects with different network devices which lead to the study of reliability, scalability and security. Security is the major part of the outsourced databases. Prior works like searchable encryption and proxy re-encryption have been introduced by research communities. Still, the security requirements of the healthcare application are not yet achieved. Notwithstanding, prior searching encryption degrades in terms of storage computation. In this paper, we have proposed timing enabled proxy reencryption system that permits users to access the data under certain time period T. Each identified user is defined with set of attributes and valid time period T. Security analysis in terms of decryption key compromised, Expiration of identity, conjunctive based similarity keyword search and lessened complexity of key update phase have been studied.

UR - http://www.scopus.com/inward/record.url?scp=85042750516&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85042750516&partnerID=8YFLogxK

U2 - 10.1109/ICACCI.2017.8126145

DO - 10.1109/ICACCI.2017.8126145

M3 - Conference contribution

AN - SCOPUS:85042750516

VL - 2017-January

SP - 2040

EP - 2044

BT - 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Bhateja R, Saxena N, Acharjya DP. Enhanced timing enabled proxy re-encryption model for E-health data in the public cloud. In 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Vol. 2017-January. Institute of Electrical and Electronics Engineers Inc. 2017. p. 2040-2044 https://doi.org/10.1109/ICACCI.2017.8126145