Privacy Preservation for Outsourced Medical Data with Flexible Access Control

ABSTRACT

Electronic medical records (EMRs) play an important role in healthcare networks. Since these records always contain considerable sensitive information regarding patients, privacy preservation for the EMR system is critical. Current schemes usually authorize a user to read one’s EMR if and only if his/her role satisfies the defined access policy. However, these existing schemes allow an adversary to link patients’ identities to their doctors. Therefore, classifications of patients’ diseases are leaked without adversaries actually seeing patients’ EMRs. To address this problem, we present two anonymous scheme . They not only achieve data confidentiality but also realize anonymity for individuals. The first scheme achieves moderate security, where adversaries choose attack targets before obtaining information from the EMR system. The second scheme achieves full security, where adversaries adaptively choose attack targets after interaction with the EMR system. We provide rigorous proof showing the security and anonymity of our schemes. In addition, we propose an approach in which EMR owners can search for their EMRs in an anonymous system. For a better user experience, we apply the “online/offline” approach to speed up data processing. Experimental results show that the time complexity for key generation and EMR encapsulation can be reduced to milliseconds

CONCLUSION

In this paper, we propose two anonymous RBAC schemes for the EMR system. We achieve flexible access control such that the EMR data can be encapsulated according to an on-demand access policy, with only users whose roles satisfy the Any Query Call Us: 9566355386

 

access policy being able to decapsulate it. Patients’ privacy is preserved using a bilinear group, where all the identity-related information is hidden in a subgroup. Based on the chosen bilinear group assumptions, we prove that our proposed models have the property of semantic security and anonymity. We apply the “online/ offline” approach to achieve a better user experience.

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

• System : Pentium IV 2.4 GHz.

• Hard Disk : 40 GB.

• Floppy Drive : 1.44 Mb.

• Monitor : 15 VGA Colour.

• Mouse : Logitech.

• Ram : 512 Mb.

 

SOFTWARE REQUIREMENTS:

• Operating system : - Windows XP/7.

• Coding Language : JAVA/J2EE

• Data Base : MYSQL

 

REFERENCES

[1] M. J. Atallah, M. Blanton, and K. B. Frikken, “Dynamic and efficient key management for access hierarchies,” ACM Trans. Inf. Syst. Secur., vol. 12, no. 3, 2009. Any Query Call Us: 9566355386

 

[2] J. Huang, M. Sharaf, and C. T. Huang, “A hierarchical framework for secure and scalable ehr sharing and access control in multi-cloud,” in ICPPW 2012. IEEE, 2012, pp. 279–287.

[3] M. C. Mont, P. Bramhall, and K. Harrison, “A flexible role-based secure messaging service: Exploting ibe technology for privacy in health care,” IEEE Computer Society, vol. 432, 2003.