ABSTRACT
Electronic medical records (EMRs) play an important role in
healthcare networks. Since these records always contain considerable sensitive
information regarding patients, privacy preservation for the EMR system is
critical. Current schemes usually authorize a user to read one’s EMR if and
only if his/her role satisfies the defined access policy. However, these
existing schemes allow an adversary to link patients’ identities to their
doctors. Therefore, classifications of patients’ diseases are leaked without
adversaries actually seeing patients’ EMRs. To address this problem, we present
two anonymous scheme . They not only achieve data confidentiality but also
realize anonymity for individuals. The first scheme achieves moderate security,
where adversaries choose attack targets before obtaining information from the
EMR system. The second scheme achieves full security, where adversaries
adaptively choose attack targets after interaction with the EMR system. We
provide rigorous proof showing the security and anonymity of our schemes. In
addition, we propose an approach in which EMR owners can search for their EMRs
in an anonymous system. For a better user experience, we apply the
“online/offline” approach to speed up data processing. Experimental results
show that the time complexity for key generation and EMR encapsulation can be
reduced to milliseconds
CONCLUSION
In this paper, we propose two anonymous RBAC schemes for the
EMR system. We achieve flexible access control such that the EMR data can be
encapsulated according to an on-demand access policy, with only users whose
roles satisfy the Any Query Call Us: 9566355386
access policy being
able to decapsulate it. Patients’ privacy is preserved using a bilinear group,
where all the identity-related information is hidden in a subgroup. Based on
the chosen bilinear group assumptions, we prove that our proposed models have
the property of semantic security and anonymity. We apply the “online/ offline”
approach to achieve a better user experience.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV
2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44
Mb.
• Monitor : 15 VGA
Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : -
Windows XP/7.
• Coding Language :
JAVA/J2EE
• Data Base : MYSQL
REFERENCES
[1] M. J. Atallah, M. Blanton, and K. B. Frikken, “Dynamic
and efficient key management for access hierarchies,” ACM Trans. Inf. Syst.
Secur., vol. 12, no. 3, 2009. Any Query Call Us: 9566355386
[2] J. Huang, M.
Sharaf, and C. T. Huang, “A hierarchical framework for secure and scalable ehr
sharing and access control in multi-cloud,” in ICPPW 2012. IEEE, 2012, pp.
279–287.
[3] M. C. Mont, P. Bramhall, and K. Harrison, “A
flexible role-based secure messaging service: Exploting ibe technology for
privacy in health care,” IEEE Computer Society, vol. 432, 2003.