Abstract

PurposeHealthcare consumers should have control over their shared health data in social networks and cloud-based systems through specifying their data protection policies, and preventing unauthorized data access and modifications. This consumer-centered approach requires a completely secure framework and protocol that enables consumers to easily revoke users and have control over their data after data sharing. We aimed to develop a security framework that enables consumers to securely share data with the healthcare team, revoke users, and control their data after sharing, considering a complete authenticity between all parties involved in data sharing. MethodsUsing the ElGamal and the ciphertext-policy attribute-based encryption (CP-ABE) algorithms, we developed a hardware-independent, role-based, and data type-based framework. We evaluated our framework in terms of “Secret x”, “Alive”, “Niagree, “WeakAgree” and “Nisynch” security claims. We also evaluated the secrecy of the suggested protocol by using an automated security verification tool (ProVerif). We evaluated the scalability of our solution to measure the maximum workload that it can tolerate. We also evaluated our framework in terms of the required time and volume of data to encrypt and access the data. ResultsThe security evaluation showed that our framework for the four roles of consumer, physician, cloud server, and proxy server are secure against the security claims. ProVerif simulation results indicated that the suggested protocol was safe for consumers’ private information. Our resource utilization experiment showed that on average for 1617.1015 KB of input data, 10.282 seconds were needed. In addition, on average for 1617.0742 KB of data consumed, 0.797 s were required. The scalability test showed that the proxy server could respond to 2885 concurrent requests in 60 s and the cloud server could respond to 777 concurrent requests in 60 seconds. ConclusionIn comparison with the state-of-the-art approaches, the evaluations demonstrate that our framework provides more features such as flexible access control after data sharing and is also more efficient in terms of the computational cost of user revocation.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.