Effective Stochastic Decoding Method for Electronic Medical Information Sharing
DOI:
https://doi.org/10.55524/ijircst.2023.11.3.17Keywords:
Encryption, Decryption, Internet of Things, Personal Health RecordsAbstract
Several IoT solutions have emerged as a result of the industry's massive expansion. E-health has the potential to provide high-quality, accessible treatment. ' It's a challenge to keep the user 's private medical file safe. Using a cryptography method, such as protecting personal data, is one option. In order to communicate information with several participants, each receiver must have their own unique encryption key (physicians, health agencies, etc.). Recompilation of the master password is required by one side of the (t, n) cutoff selective encryp tion mechanism for data exchange. This study presents a decentralized decoding method for PHR distribution that is successful. It's simple to exchange information with others without having to reassemble the decoding pass word. We test the chosen-ciphertext safety of our tech nique. The JPBC package is used to execute our method on a PC. Our strategy seems to be viable and successful in ePHR, according on the results of our tests.
Downloads
References
G. Eysenbach, “What is e-health?” J. Med. Internet Res., vol. 3, no. 2, p. e20, 2001.
V. Chang, Y.-H. Kuo, and M. Ramachandran, “Cloud computing adoption framework: A security framework for business clouds,” Future Gener. Comput. Syst., vol. 57, pp. 24–41, Apr. 2016.
M. Obaidat and N. Boudriga, Security of E-Systems and Computer Networks. Cambridge, U.K.: Cambridge Univ. Press, 2007.
P. C. Tang, J. S. Ash, D. W. Bates, J. M. Overhage, and D. Z. Sands, “Personal health records: Definitions, benefits, and strategies for overcoming barriers to adoption,” J. Amer. Med. Inform. Assoc., vol. 13, no. 2, pp. 121–126, Mar. 2006.
R. Pifer. Patient Use of Digital Health Tools Lags Behind Hype, Poll Finds. Accessed: Sep. 12, 2019. [Online]. Available: https://www. healthcaredive.com/news/patient use-of-digital-health-tools-lags-behindhype- poll finds/562778/
Protenus. (2018). 32 Million Breached Patient Records in First Half of 2019 Double Total for all of 2018. Accessed: Jul. 31, 2019. [Online]. Available: https://www.prnewswire.com/news-releases/32-million
breached-patient-records-in-first-half-of-2019-double total-forall-of-2018-300894237.html
J. L. Fernández-Alemán, I. C. Señor, P. Á. O. Lozoya, and A. Toval, “Security and privacy in electronic health rec ords: A systematic literature review,” J. Biomed. Infor mat., vol. 46, no. 3, pp. 541–562, Jun. 2013.
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud compu ting using attribute based encryption,” IEEE Trans. Paral lel Distrib. Syst., vol. 24, no. 1, pp. 131–143, Jan. 2013.
H. Qian, J. Li, Y. Zhang, and J. Han, “Privacy-preserving personal health record using multi-authority attribute based encryption with revocation,” Int. J. Inf. Secur., vol. 14, no. 6, pp. 487–497, Nov. 2015.
X. Liu, Y. Xia, W. Yang, and F. Yang, “Secure and effi cient querying over personal health records in cloud com puting,” Neurocomputing, vol. 274, pp. 99–105, Jan. 2018.
M. S. Obaidat, I. Traore, and I. Woungang, Biometric Based Physical and Cybersecurity Systems, vol. 368. Cham, Switzerland: Springer,2019.
D. Boneh and M. K. Franklin, “Identity-based encryption from the Weil pairing,” in Advances in Cryptology— CRYPTO (Lecture Notes in Computer Science), vol. 2139, J. Kilin, Eds. Berlin, Germany: Springer, Aug. 2001, pp. 213–229.
M. Focus. Voltage Securemail On-Premises On-Premises Email Encryption. Accessed: Oct. 20, 2018. [Online]. Available: https://www.microfocus.com/en us/products/email-encryption-security/
M. L. PURA and V. V. Patriciu, “Identity-based chryptog raphy: From proposals to everyday use,” Sci. Res. Educ. Air Force-AFASES, vol. 1, pp. 367–374, May 2014.
X. Boyen and L. Martin, Identity-Based Cryptography Standard (IBCS)#1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems,document RFC 5091, Dec. 2007.
A. De Caro and V. Iovino, “JPBC: Java pairing based cryptography,” in Proc. IEEE Symp. Comput. Commun. (ISCC), Jun. 2011, pp. 850–855.
K. D. Mandl, W. W. Simons, W. C. Crawford, and J. M. Abbett, “Indivo: A personally controlled health record for health information exchange and communication,” BMC Med. Informat. Decis. Making, vol. 7, no. 1, p. 25, Dec. 2007.
J. Hu, H.-H. Chen, and T.-W. Hou, “A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations,” Comput. Standards Interfaces, vol. 32, nos. 5–6, pp. 274–280, Oct. 2010.
J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled encryption: Ensuring privacy of electronic medical records,” in Proc. ACM Workshop Cloud Com put. Secur. (CCSW), 2009, pp. 103–114.
C. O. Rolim, F. L. Koch, C. B. Westphall, J. Werner, A. Fracalossi, and G. S. Salvador, “A cloud computing solu tion for patient’s data collection in health care institu tions,” in Proc. 2nd Int. Conf. eHealth, Telemedi cine,Social Med., Feb. 2010, pp. 95–99.
J. A. Akinyele, M. W. Pagano, M. D. Green, C. U. Leh mann, Z. N. J. Peterson, and A. D. Rubin, “Securing elec tronic medical records using attribute-based encryption on mobile devices,” in Proc. 1st ACM Workshop Secur. Pri vacy Smartphones Mobile Devices (SPSM), 2011, pp. 75– 86.