Multiauthority Access Control With Anonymous Authentication for Personal Health Record

2021 ◽  
Vol 8 (1) ◽  
pp. 156-167
Author(s):  
Leyou Zhang ◽  
Yadi Ye ◽  
Yi Mu
2019 ◽  
Vol 2019 ◽  
pp. 1-15 ◽  
Author(s):  
Thein Than Thwin ◽  
Sangsuree Vasupongayya

Personal health record system (PHR system) stores health-related information of an individual. PHR system allows the data owner to manage and share his/her data with selected individuals. The originality or tamper resistance feature is crucial for PHR system because of the irreversible consequence of incorrect information. Blockchain technology becomes a potential solution due to its immutability and irreversibility properties. Unfortunately, some technical impediments such as limited storage, privacy concern, consent irrevocability, inefficient performance, and energy consumption exist. This work aims to handle these blockchain drawbacks and propose a blockchain-based PHR model. The proposed model is built using the blockchain technology to support a tamper resistance feature. Proxy reencryption and other cryptographic techniques are employed to preserve privacy. Features of the proposed model include fine-grained and flexible access control, revocability of consent, auditability, and tamper resistance. A detailed security analysis shows that the proposed model is provably secure for privacy and tamper resistance. The performance analysis shows that the proposed model achieves a better overall performance compared with the existing approach in the literature. Thus the proposed model is more suitable for the PHR system usage.


Presently, usage of Cloud computing is increasing, due to internet availability most of Personal Health Record (PHR) owners outsourcing their records to the cloud, but it is untrusted, so a security mechanism needed in this paper proposing Dynamic Time-based encryption (DTBE), it derived from classic ABE. In the past, many researchers suggested different access controls for secure PHR. Still, most of the access control mechanisms introduce burden to the PHR owner while performing dynamic operations insertion, PHR user revocation, and when it updates, PHR users attribute list. Most of the ABE schemes have several limitations as it cannot efficiently handle adding or revoking users or identity attributes. It needs to keep multiple encrypted copies of the same key that incurs high computational costs. So, there is a need for a suitable access control mechanism that should support effective policies.


Sign in / Sign up

Export Citation Format

Share Document