PriGen: A Generic Framework to Preserve Privacy of Healthcare Data in the Cloud

作者: Farzana Rahman , Sheikh Iqbal Ahamed , Ji-Jiang Yang , Qing Wang

DOI: 10.1007/978-3-642-39470-6_10

关键词:

摘要: With the rise of Healthcare IT infrastructures, need healthcare data sharing and integration has become extremely important. Cloud computing paradigm is one most popular infrastructures for facilitating electronic health record integration. Many predict that managing applications with clouds will make revolutionary change in way we do today. Enabling access to ubiquitous not only help us improve as our always be accessible from anywhere at any time, but also it helps cutting down costs drastically. However, since contains lots sensitive private information, how protect privacy within untrusted cloud facing a huge challenge. Thus, mechanism needed when these are stored processed provide various medical services. To address this issue, paper, present generic framework named PriGen preserves cloud. allows users preserve while accessing based service without trusted third party. making use homomorphic encryption function on information; proposed maintains confidentiality information sent by providers. In brief discussion different components framework.

参考文章(23)
Charu C. Aggarwal, Philip S. Yu, A General Survey of Privacy-Preserving Data Mining Models and Algorithms Privacy-Preserving Data Mining. pp. 11- 52 ,(2008) , 10.1007/978-0-387-70992-5_2
Craig Gentry, Computing arbitrary functions of encrypted data Communications of the ACM. ,vol. 53, pp. 97- 105 ,(2010) , 10.1145/1666420.1666444
Ann Cavoukian, Privacy in the clouds Identity in the Information Society. ,vol. 1, pp. 89- 108 ,(2008) , 10.1007/S12394-008-0005-Z
Ishna Neamatullah, Margaret M Douglass, Li-wei H Lehman, Andrew Reisner, Mauricio Villarroel, William J Long, Peter Szolovits, George B Moody, Roger G Mark, Gari D Clifford, Automated de-identification of free-text medical records BMC Medical Informatics and Decision Making. ,vol. 8, pp. 32- 32 ,(2008) , 10.1186/1472-6947-8-32
Lillian Røstad, Øystein Nytrø, Personalized access control for a personally controlled health record Proceedings of the 2nd ACM workshop on Computer security architectures - CSAW '08. pp. 9- 16 ,(2008) , 10.1145/1456508.1456511
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Dan Boneh, Hovav Shacham, Group signatures with verifier-local revocation computer and communications security. pp. 168- 177 ,(2004) , 10.1145/1030083.1030106
David Chaum, Security without identification: transaction systems to make big brother obsolete Communications of the ACM. ,vol. 28, pp. 1030- 1044 ,(1985) , 10.1145/4372.4373
Huang Ruwei, Gui Xiaolin, Yu Si, Zhuang Wei, Study of privacy-preserving framework for cloud storage Computer Science and Information Systems. ,vol. 8, pp. 801- 819 ,(2011) , 10.2298/CSIS100327029R
Lei Chen, Ji-Jiang Yang, Qing Wang, Yu Niu, A framework for privacy-preserving healthcare data sharing international conference on e-health networking, applications and services. pp. 341- 346 ,(2012) , 10.1109/HEALTHCOM.2012.6379433