Secure Access Control of E-Health System with Attribute-Based Encryption
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yan, Hongyang | - |
dc.contributor.author | Li, Jin | - |
dc.contributor.author | Li, Xuan | - |
dc.contributor.author | Zhao, Gansen | - |
dc.contributor.author | Lee, Sun-Young | - |
dc.contributor.author | Shen, Jian | - |
dc.date.accessioned | 2021-08-11T18:45:48Z | - |
dc.date.available | 2021-08-11T18:45:48Z | - |
dc.date.issued | 2016 | - |
dc.identifier.issn | 1079-8587 | - |
dc.identifier.issn | 2326-005X | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/9924 | - |
dc.description.abstract | Cloud computing is a new paradigm, which provides low-cost and effective outsourced data storage service. People are used to storing personal data in cloud server. E-Health system (EHS) privacy should be protected, because it is national security for citizen privacy. Personal Health Record (PHR) is the core of EHS that should be protected. Thus, how to efficiently store, access and share these data is critical. Attribute-based encryption (ABE) is a new public key encryption based on users' attributes. In this paper, we present a new method to realize a secure fine-grained access control to PHRs, which is based on emerging ABE primitives. In more details, PHR owners divide the PHR data in terms of the privacy levels. A key-policy ABE (KP-ABE) is utilized to provide a fine-grained access control storage system for outsourced sensitive data. It can also provide efficient user revocation by using the timestamp in the private key. Security analysis shows that our construction achieves the data confidentiality. That is, any unauthorized user is not allowed to access the data outsourced in the cloud. | - |
dc.format.extent | 8 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | AutoSoft Press | - |
dc.title | Secure Access Control of E-Health System with Attribute-Based Encryption | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1080/10798587.2015.1132586 | - |
dc.identifier.scopusid | 2-s2.0-84958537156 | - |
dc.identifier.wosid | 000380901000003 | - |
dc.identifier.bibliographicCitation | Intelligent Automation and Soft Computing, v.22, no.3, pp 345 - 352 | - |
dc.citation.title | Intelligent Automation and Soft Computing | - |
dc.citation.volume | 22 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 345 | - |
dc.citation.endPage | 352 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Automation & Control Systems | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Automation & Control Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.subject.keywordAuthor | Cloud computing | - |
dc.subject.keywordAuthor | attribute-based encryption | - |
dc.subject.keywordAuthor | cloud storage | - |
dc.subject.keywordAuthor | PHR | - |
dc.subject.keywordAuthor | security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.