scholarly journals Securing Personal Health Records using Advanced Multi-Factor Authentication in Cloud Computing

2020 ◽  
Vol 8 (6) ◽  
pp. 5133-5140

Cloud computing is a novel prototype to provide services via the internet. Most of the fields like banking, industries, educational institutions, and healthcare are storing their applications, data and accessing it through cloud because of its versatility and affordable price. Even though cloud has a many special feature, data security and privacy are the most important issues in a cloud background. Especially in healthcare sector, according to recent report numerous amount of healthcare data breached by unknown websites and hackers, and much healthcare information breaches are occurring around the world for different purposes and still it is vulnerable on account of storing and accessing data through third party cloud servers. Due to many attacks on personal health records data security and privacy in cloud environment, it is a primary task to concentrate on solving this issue because such health information are really sensitive, and playing vital role in decision-making of patients health which wrong decision may spoil patient’s health, life along with health institution’s reputation. To ensure security and privacy, data encryption and authentication are the key technologies which are a technique to secure data and create proof identities to obtain access of data in the system. Conventional password authentication does not provide sufficient security for information to the new means of attacks. So, this paper introduces a framework for data encryption using standard RSA and Hash function and advanced multi factor authentication technique to cloud data access which authenticates the user based on different factors such as contextual, signcryption and iris bio-metric features. This prototype to cloud computing is implemented using open source technology. The proposed advanced system minimizes intermediate data access due to the complexity of key access and strong authentication. The performance of the system has been evaluated using experimental results such as encryption and decryption time, authentication accuracy, execution time.

2014 ◽  
Vol 11 (13) ◽  
pp. 121-127 ◽  
Author(s):  
Danwei Chen ◽  
Linling Chen ◽  
Xiaowei Fan ◽  
Liwen He ◽  
Su Pan ◽  
...  

Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3135
Author(s):  
Mohammed Alshehri ◽  
Brajendra Panda ◽  
Sultan Almakdi ◽  
Abdulwahab Alazeb ◽  
Hanan Halawani ◽  
...  

The world has experienced a huge advancement in computing technology. People prefer outsourcing their confidential data for storage and processing in cloud computing because of the auspicious services provided by cloud service providers. As promising as this paradigm is, it creates issues, including everything from data security to time latency with data computation and delivery to end-users. In response to these challenges, the fog computing paradigm was proposed as an extension of cloud computing to overcome the time latency and communication overhead and to bring computing and storage resources close to both the ground and the end-users. However, fog computing inherits the same security and privacy challenges encountered by traditional cloud computing. This paper proposed a fine-grained data access control approach by integrating the ciphertext policy attribute-based encryption (CP-ABE) algorithm and blockchain technology to secure end-users’ data security against rogue fog nodes in case a compromised fog node is ousted. In this approach, we proposed federations of fog nodes that share the same attributes, such as services and locations. The fog federation concept minimizes the time latency and communication overhead between fog nodes and cloud servers. Furthermore, the blockchain idea and the CP-ABE algorithm integration allow for fog nodes within the same fog federation to conduct a distributed authorization process. Besides that, to address time latency and communication overhead issues, we equip each fog node with an off-chain database to store the most frequently accessed data files for a particular time, as well as an on-chain access control policies table (on-chain files tracking table) that must be protected from tampering by rogue fog nodes. As a result, the blockchain plays a critical role here because it is tamper-proof by nature. We assess our approach’s efficiency and feasibility by conducting a simulation and analyzing its security and performance.


2020 ◽  
Author(s):  
Hao Sen Andrew Fang ◽  
Teng Hwee Tan ◽  
Yan Fang Cheryl Tan ◽  
Marcus Tan

BACKGROUND Blockchain technology has the potential to enable more secure, transparent and equitable data management. In the healthcare domain, it has been most frequently applied to electronic health records (EHRs). Apart from securely managing data, blockchain also has a significant advantage of distributing data access, control and ownership to the end-users. This attribute, among others, makes it especially appealing when used to power personal health records (PHRs). OBJECTIVE In this review, we aim to examine the current landscape, design choices and limitations of blockchain-based PHRs. METHODS Adopting the PRISMA guidelines, a cross-discipline systematic review was performed in July 2020 on all eligible articles, including grey literature, from the following eight databases: ACM, IEEE Xplore, MEDLINE, ScienceDirect, Scopus, SpringerLink, Web of Science and Google Scholar. Three reviewers independently performed a full-text review and data abstraction using a standardized data collection form. RESULTS 58 articles fulfilled the inclusion criteria. The review found that the blockchain PHR space has been maturing over the past five years, from purely conceptual ideas initially to an increasing trend of publications describing prototypes and even implementations. Although the eventual PHR application is purposed for the healthcare industry, majority of the articles came from Engineering or Computer Science publications. Among the blockchain PHRs described, permissioned blockchains and off-chain storage were the more common design choices. While eighteen articles described a tethered blockchain PHR, all of these were at the conceptual stage. CONCLUSIONS This review revealed that research interest in using blockchain for PHRs is increasing and that the space is maturing. With further experimentation, this trend will very likely lead to breakthroughs to address existing limitations which could ultimately accelerate the adoption of blockchain PHRs.


Sign in / Sign up

Export Citation Format

Share Document