University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently

Gritti, Clémentine, Susilo, Willy, Plantard, Thomas, Liang, Kaitai and Wong, Duncan S (2014) Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5 (4). pp. 3-28.

Full text not available from this repository.


The issue of empowering patients to be well informed with regards to their health records has been well accepted in the community, which is known as the Personal Health Record (PHR). PHR has been believed as the solution for better management of an individual’s health, and as the tool that will empower the patient in correlation with healthcare providers through the ability to provide his/her own medical history. In this work, we aim to take one step further by equipping patients with the ability to “control” the access to their PHR efficiently and easily, by incorporating the emerging cloud technology. Specifically, we aim to provide the patients with the luxury of using the power of the cloud to conduct the outsourced work efficiently. To realize this, we present the notion of online/offline ciphertext-policy attribute-based proxy re-encryption scheme, which is very useful primitive in empowering personal health records in cloud computing. We present such a notion as well as a set of security requirements. More specifically, we define two security models covering both outsider and insider attacks. Furthermore, we present a concrete construction of such a scheme, and prove that it is secure under the well known complexity assumptions and following our security models.

Item Type: Article
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
Date : 2014
Identification Number : 10.22670/JOWUA.2014.12.31.003)
Uncontrolled Keywords : Ciphertext-Policy Attribute-Based Encryption, Proxy Re-Encryption, Online/Offline encryption, CCA security
Depositing User : Jane Hindle
Date Deposited : 31 Oct 2017 14:50
Last Modified : 31 Oct 2017 14:50

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800