Author:
Walid Redwan,Joshi Karuna Pande,Choi Seung Geol
Abstract
AbstractE-health has become a top priority for healthcare organizations focused on advancing healthcare services. Thus, medical organizations have been widely adopting cloud services, resulting in the effective storage of sensitive data. To prevent privacy and security issues associated with the data, attribute-based encryption (ABE) has been a popular choice for encrypting private data. Likewise, the attribute-based access control (ABAC) technique has been widely adopted for controlling data access. Researchers have proposed electronic health record (EHR) systems using ABE techniques like ciphertext policy attribute-based encryption (CP-ABE), key policy attribute-based encryption (KP-ABE), and multi authority attribute-based encryption (MA-ABE). However, there is a lack of rigorous comparison among the various ABE schemes used in healthcare systems. To better understand the usability of ABE techniques in medical systems, we performed a comprehensive review and evaluation of the three popular ABE techniques by developing EHR systems using knowledge graphs with the same data but different encryption mechanisms. We have used the MIMIC-III dataset with varying record sizes for this study. This paper can help healthcare organizations or researchers using ABE in their systems to comprehend the correct usage scenario and the prospect of ABE deployment in the most recent technological evolution.
Funder
Office of Naval Research
National Science Foundation
Publisher
Springer Science and Business Media LLC
Reference77 articles.
1. Blumenthal, D. Launching hitech. N. Engl. J. Med. 362, 382–385 (2010).
2. Centers for Disease Control and Prevention. Hipaa privacy rule and public health. Guidance from CDC and the US department of health and human services. MMWR Morb. Mortal. Wkly. Rep. 52, 1–17 (2003).
3. Assistance, H. C. Summary of the hipaa privacy rule. Office for Civil Rights (2003).
4. Mhatre, S., Nimkar, A. V. & Dhage, S. N. Comparative study on attribute-based encryption for health records in cloud storage. In 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 647–652 (IEEE, 2017).
5. Bethencourt, J., Sahai, A. & Waters, B. Ciphertext-policy attribute-based encryption. In 2007 IEEE Symposium on Security and Privacy (SP’07), 321–334 (IEEE, 2007).