Detailed Information

Cited 0 time in webofscience Cited 11 time in scopus
Metadata Downloads

Secure Access Control of E-Health System with Attribute-Based Encryption

Full metadata record
DC Field Value Language
dc.contributor.authorYan, Hongyang-
dc.contributor.authorLi, Jin-
dc.contributor.authorLi, Xuan-
dc.contributor.authorZhao, Gansen-
dc.contributor.authorLee, Sun-Young-
dc.contributor.authorShen, Jian-
dc.date.accessioned2021-08-11T18:45:48Z-
dc.date.available2021-08-11T18:45:48Z-
dc.date.issued2016-
dc.identifier.issn1079-8587-
dc.identifier.issn2326-005X-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/9924-
dc.description.abstractCloud computing is a new paradigm, which provides low-cost and effective outsourced data storage service. People are used to storing personal data in cloud server. E-Health system (EHS) privacy should be protected, because it is national security for citizen privacy. Personal Health Record (PHR) is the core of EHS that should be protected. Thus, how to efficiently store, access and share these data is critical. Attribute-based encryption (ABE) is a new public key encryption based on users' attributes. In this paper, we present a new method to realize a secure fine-grained access control to PHRs, which is based on emerging ABE primitives. In more details, PHR owners divide the PHR data in terms of the privacy levels. A key-policy ABE (KP-ABE) is utilized to provide a fine-grained access control storage system for outsourced sensitive data. It can also provide efficient user revocation by using the timestamp in the private key. Security analysis shows that our construction achieves the data confidentiality. That is, any unauthorized user is not allowed to access the data outsourced in the cloud.-
dc.format.extent8-
dc.language영어-
dc.language.isoENG-
dc.publisherAutoSoft Press-
dc.titleSecure Access Control of E-Health System with Attribute-Based Encryption-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1080/10798587.2015.1132586-
dc.identifier.scopusid2-s2.0-84958537156-
dc.identifier.wosid000380901000003-
dc.identifier.bibliographicCitationIntelligent Automation and Soft Computing, v.22, no.3, pp 345 - 352-
dc.citation.titleIntelligent Automation and Soft Computing-
dc.citation.volume22-
dc.citation.number3-
dc.citation.startPage345-
dc.citation.endPage352-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaAutomation & Control Systems-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryAutomation & Control Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.subject.keywordAuthorCloud computing-
dc.subject.keywordAuthorattribute-based encryption-
dc.subject.keywordAuthorcloud storage-
dc.subject.keywordAuthorPHR-
dc.subject.keywordAuthorsecurity-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Sun Young photo

Lee, Sun Young
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE