Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

IEEE Transactions on Parallel and Distributed Systems - Tập 24 Số 1 - Trang 131-143 - 2013
Ming Li1, Shucheng Yu2, Yao Zheng3, Kui Ren4, Wenjing Lou3
1Dept. of CS, Utah State Univ., Logan, UT, USA
2Dept. of CS, Univ. of Arkansas at Little Rock, Little Rock, AR, USA
3Dept. of CS, Virginia Tech, Falls Church, VA, USA
4Dept. of Computer Science and Engineering, University at Buffalo, Buffalo, NY, USA#TAB#

Tóm tắt

Từ khóa


Tài liệu tham khảo

lewko, 2011, Decentralizing Attribute-Based Encryption, EUROCRYPT Proc 30th Ann Int'l Conf Theory and Applications of Cryptographic Techniques Advances in Cryptology, 568

10.1109/INFCOM.2010.5462174

2012, The Health Insurance Portability and Accountability Act

akinyele, 2010, Self-Protecting Electronic Medical Records Using Attribute-Based Encryption

li, 2011, Authorized Private Keyword Search over Encrypted Personal Health Records in Cloud Computing, Proc 31st Int'l Conf Distributed Computing Systems (ICDCS '11)

10.1145/1882992.1883024

li, 2010, Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings, Proc Sixth Int'l ICST Conf Security and Privacy in Comm Networks (SecureComm '10), 89, 10.1007/978-3-642-16161-2_6

10.1145/1655008.1655024

10.1136/bmj.322.7281.283

2006, At Risk of Exposure - in the Push for Electronic Medical Records, Concern Is Growing About How Well Privacy Can Be Safeguarded

2012, Google, Microsoft Say Hipaa Stimulus Rule Doesn't Apply to Them

2012, Indivo.

di vimercati, 2007, Over-Encryption: Management of Access Control Evolution on Outsourced Data, Proc 33rd Int'l Conf Very Large Data Bases (VLDB '07), 123

10.1109/TrustCom.2011.15

lewko, 2011, Decentralizing Attribute-Based Encryption, EUROCRYPT Proc 30th Ann Int'l Conf Theory and Applications of Cryptographic Techniques Advances in Cryptology, 568

10.1109/TPDS.2010.203

jahid, 2011, Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation, Proc ACM Symp Information Computer and Comm Security (ASIACCS), 10.1145/1966913.1966970

10.1145/1653662.1653678

liang, 2010, Ciphertext Policy Attribute Based Encryption with Efficient Revocation

10.1109/SP.2007.11

10.1109/PHEALTH.2009.5754828

perrig, 2002, Spins: Security Protocols for Sensor Networks, Wireless Networking, 8, 521, 10.1023/A:1016598314198

10.1109/MWC.2004.1269716

zheng, 2011, Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption

dong, 2010, Shared and Searchable Encrypted Data for Untrusted Servers, J Computer Security, 19, 367, 10.3233/JCS-2010-0415

lynn, 2012, The Pbc Library

10.1145/1180405.1180418

pirretti, 2010, Secure Attribute-Based Systems, J Computer Security, 18, 799, 10.3233/JCS-2009-0383

10.1109/MWC.2010.5416350

10.1145/1455770.1455823

attrapadung, 2009, Conjunctive Broadcast and Attribute-Based Encryption, Proc Third Int'l Conf Palo Alto on Pairing-Based Cryptography-Pairing, 248

ibraimi, 2009, Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes

mller, 2009, Distributed Attribute-Based Encryption, Proc 11th Int'l Conf Information Security and Cryptology (ICISC 08), 20

yu, 2010, Attribute Based Data Sharing with Attribute Revocation, Proc Fifth ACM Symp Information Computer and Comm Security (ASIACCS '10), 10.1145/1755688.1755720

chow, 2010, New Privacy-Preserving Architectures for Identity-/Attribute-Based Encryption

10.1145/1866835.1866845

zheng, 2012, Key-Policy Attribute-Based Encryption Scheme Implementation

liang, 2010, Patient Self-Controllable Access Policy on Phi in Ehealthcare Systems, Proc Advances in Health Informatics Conf (AHIC 10)