Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records

Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records

Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker
ISBN13: 9781466602823|ISBN10: 1466602821|EISBN13: 9781466602830
DOI: 10.4018/978-1-4666-0282-3.ch006
Cite Chapter Cite Chapter

MLA

Ibraimi, Luan, et al. "Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records." Innovations in Data Methodologies and Computational Algorithms for Medical Applications, edited by Aryya Gangopadhyay, IGI Global, 2012, pp. 73-93. https://doi.org/10.4018/978-1-4666-0282-3.ch006

APA

Ibraimi, L., Tang, Q., Hartel, P., & Jonker, W. (2012). Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. In A. Gangopadhyay (Ed.), Innovations in Data Methodologies and Computational Algorithms for Medical Applications (pp. 73-93). IGI Global. https://doi.org/10.4018/978-1-4666-0282-3.ch006

Chicago

Ibraimi, Luan, et al. "Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records." In Innovations in Data Methodologies and Computational Algorithms for Medical Applications, edited by Aryya Gangopadhyay, 73-93. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0282-3.ch006

Export Reference

Mendeley
Favorite

Abstract

Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an inappropriate disclosure may cause serious problems to an individual. Therefore commercial Web-based PHR systems have to ensure that the patient health data is secured using state-of-the-art mechanisms. In current commercial PHR systems, even though patients have the power to define the access control policy on who can access their data, patients have to trust entirely the access-control manager of the commercial PHR system to properly enforce these policies. Therefore patients hesitate to upload their health data to these systems as the data is processed unencrypted on untrusted platforms. Recent proposals on enforcing access control policies exploit the use of encryption techniques to enforce access control policies. In such systems, information is stored in an encrypted form by the third party and there is no need for an access control manager. This implies that data remains confidential even if the database maintained by the third party is compromised. In this paper we propose a new encryption technique called a type-and-identity-based proxy re-encryption scheme which is suitable to be used in the healthcare setting. The proposed scheme allows users (patients) to securely store their PHRs on commercial Web-based PHRs, and securely share their PHRs with other users (doctors).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.