Open Access
Design of secure access control scheme for personal health record‐based cloud healthcare service
Author(s) -
Liu ChiaHui,
Lin FongQi,
Chen ChinSheng,
Chen TzerShyong
Publication year - 2014
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.1087
Subject(s) - cloud computing , computer science , computer security , access control , health care , cloud computing security , personally identifiable information , service (business) , control (management) , information sensitivity , scheme (mathematics) , internet privacy , business , mathematical analysis , mathematics , marketing , artificial intelligence , economics , economic growth , operating system
Abstract With the development of information technology and medical technology, many developed countries have established organizations to develop electronic medical standards in response to apply the development of technology information, and they gradually develop the emerging patterns of personal health records (PHRs). PHR can integrate different kinds of health information and can offer the integrity and accuracy of personal health and medical records. Using the cloud computing environment to implement the PHR system; we can decrease the infrastructure management costs, adjusting the dynamic resources immediately on the basis of the changes of client's demand and other advantages. To assure that the security information in cloud computing environment is important to users, this paper provides efficient and safe access managing mechanism to solve PHR implement on cloud environment's security problem, avoiding possibility that the information security being threatened in the Cloud may lead to the collapse of medical care, patients' stolen data, loss of personal privacy, and financial or other serious consequences. This paper presents bilinear pairing that was constructed in the cloud computing environment of the new PHR access control mechanism, which suited for deploying a large‐scale and multiple identities of users, and users are safe and efficient in accessing the PHR information. Copyright © 2014 John Wiley & Sons, Ltd.