TBHM: A Secure Threshold-Based Encryption Combined With Homomorphic Properties for Communicating Health Records

TBHM: A Secure Threshold-Based Encryption Combined With Homomorphic Properties for Communicating Health Records

Lalit Mohan Gupta (APJ Abdul Kalam Technical University, Lucknow, India), Abdus Samad (University Women's Polytechnic, Aligarh Muslim University, Aligarh, India) and Hitendra Garg (GLA University, Mathura, India)
DOI: 10.4018/IJITWE.2020070101
OnDemand PDF Download:
List Price: $37.50
10% Discount:-$3.75


Healthcare today is one of the most promising, prevailing, and sensitive sectors where patient information like prescriptions, health records, etc., are kept on the cloud to provide high quality on-demand services for enhancing e-health services by reducing the burden of data storage and maintenance to providing information independent of location and time. The major issue with healthcare organization is to provide protected sharing of healthcare data from the cloud to the decision makers, medical practitioners, data analysts, and insurance firms by maintaining confidentiality and integrity. This article proposes a novel and secure threshold based encryption scheme combined with homomorphic properties (TBHM) for accessing cloud based health information. Homomorphic encryption completely eliminates the possibility of any kind of attack as data cannot be accessed using any type of key. The experimental results report superiority of TBHM scheme over state of art in terms throughput, file encryption/decryption time, key generation time, error rate, latency time, and security overheads.
Article Preview


The prompt and accurate e-health services in medical science completely change the era of medical diagnosis. In recent scenarios, the e-health system (Wang, Ma, Xhafa, Zhang, & Luo, 2017), telemedicine (Jin, & Chen, 2015 and Hsieh, & Hsu, 2012), healthcare diagnosis & monitoring (Miranda, Memon, Cabral, Ravelo, Wagner, Pedersen, et al., 2017; Abo-Zahhad, Ahmed, & Elnahas, 2014) and m-health systems (Ruiz-Zafra, Benghazi, Noguera, & Garrido, 2013; Bourouis, Feham, & Bouchachia, 2012), etc., drastically influence the e-health system when emerged with cloud computing. The cloud-based e-health services attract the e-health service providers to move their database over health cloud to reduce the burden of data storage and maintenance by providing healthcare information independent of location and time. Electronic health records (EHRs) is a centralized system for storing, processing, analyzing, accessing, sharing, maintaining and backing up e-health record efficiently and effectively manner but at the same time security of data is an challenging issue. EHRs consist of medical prescriptions, DNA reports, x-rays, MRI results, patient's medical private data that need to be protected. Global access to EHR is possible through the implementation of services over the cloud. In today’s time, security of publically available data is not satisfactory and privatization in the Healthcare system is a critical issue, especially when persons access personal healthcare data of patients for their commercial use. Therefore, these EHR data need to be protected for unauthorized access over the cloud maintaining integrity, consistency, and security. EHR data over the cloud is usually stored in encrypted form as this essential data is a soft target for cybercriminals. A hospital usually contains a variety and volume of medical data like prescriptions, X-rays, CT reports, blood reports and other sensitive data of patients stored over the cloud that require additional affords for security and confidentiality of these data. Only authorized users can access these sensitive data but the leakage of these data violates patient privacy. Hence, nameless authentication is enviable in a cloud environment that equips patient individuality privacy (Daglish, & Archer, 2009 and Win, Susilo, & Mu, 2006). Nameless authentication itself is a challenging issue as it is difficult to track the valid patient if EHRs are modified by someone. Hence, such a situation can be managed by implementing additional security over ownership of records and procedures rather than expansive contract to the public.

Still, secure data storage (health care records) over cloud computing is a challenging issue. Considering these facts, the proposed work aims to recommend a better scheme based on a homomorphic method for trusted evidence for healthcare records available over clouds. Concretely, this paper will make pursuing contributions:

  • To guarantee the confidentiality of health care records over the cloud using a stronger encryption method.

  • To develop a shared secure layer over the health cloud using TBHM based on homomorphism mechanism as it is vastly scalable with limited resources and faster uploading time.

  • To achieve better performance than existing schemes (Rachmawati, Tarigan, & Ginting, 2018) even at the same computation complexity.

  • To provide a provable security technique to validate its security in the standard model.

The proposed paper is organized as: in next section, the general idea of related works in security of healthcare records over the cloud and provide the summary of solutions presented for providing security, Section III describes the TBHM model and idea behind it, design of TBHM is described in section IV, Section-V presents experimental work and result analysis. Section VI includes the conclusion and future direction of the proposed work.

Complete Article List

Search this Journal:
Volume 18: 1 Issue (2023): Forthcoming, Available for Pre-Order
Volume 17: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 16: 4 Issues (2021)
Volume 15: 4 Issues (2020)
Volume 14: 4 Issues (2019)
Volume 13: 4 Issues (2018)
Volume 12: 4 Issues (2017)
Volume 11: 4 Issues (2016)
Volume 10: 4 Issues (2015)
Volume 9: 4 Issues (2014)
Volume 8: 4 Issues (2013)
Volume 7: 4 Issues (2012)
Volume 6: 4 Issues (2011)
Volume 5: 4 Issues (2010)
Volume 4: 4 Issues (2009)
Volume 3: 4 Issues (2008)
Volume 2: 4 Issues (2007)
Volume 1: 4 Issues (2006)
View Complete Journal Contents Listing