Skip to main content

Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing

  • Conference paper
Internet and Distributed Computing Systems (IDCS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8223))

Included in the following conference series:

Abstract

Personal health records (PHRs) have been appeared as patient -centric model for health information exchange, which are often outsourced to be stored in cloud services. However, the integrity and privacy of the PHRs are cause for concern that personal health information could be compromised. The principal method to guarantee integrity of PHRs is using signature mechanism when a PHR owner use the PHR to generate signature and a user is able to verify the PHR by using the signature. In some scenario, PHR owner can not sign the PHR by himself/herself, he/her wants to delegate its sign ability to other people to sign the PHR. In order to solve delegation of original signer’s capabilities to guarantee integrity of PHR and the anonymity of the signer, attribute based proxy signature scheme(ABPS) for personal health records was first proposed in this paper. We formalize and construct the ABPS. Our scheme is proved to be existentially unforgeable against chosen message attack in the standard model. Analysis shows that our ABPS is more appropriate for cloud computing environment to guarantee integrity of PHRs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57–115 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  2. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proceedings of the 5th ACM Conference on Computer and Communications Security, pp. 83–92. ACM (1998)

    Google Scholar 

  4. Huang, X., Susilo, W., Mu, Y., Wu, W.: Proxy signature without random oracles. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 473–484. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Huba, N., Zhang, Y.: Designing patient-centered personal health records (phrs): Health care professionals perspective on patient-generated data. Journal of Medical Systems 36(6), 3893–3905 (2012)

    Article  Google Scholar 

  6. Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proc. of SCIS, vol. 1, pp. 603–608 (2001)

    Google Scholar 

  7. Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based signature and its applications. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 60–69. ACM (2010)

    Google Scholar 

  8. Li, J., Kim, K.: Hidden attribute-based signatures without anonymity revocation. Information Sciences 180(9), 1681–1689 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  9. Li, J., Wang, Q., Wang, C., Ren, K.: Enhancing attribute-based encryption with attribute hierarchy. Mobile Networks and Applications 16(5), 553–561 (2011)

    Article  Google Scholar 

  10. Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 89–106. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)

    Article  Google Scholar 

  12. Liu, X., Zhang, T., Ma, J., Zhu, H., Cai, F.: Efficient data integrity verification using attribute based multi-signature scheme in wireless network. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE (2013)

    Google Scholar 

  13. Löhr, H., Sadeghi, A.-R., Winandy, M.: Securing the e-health cloud. In: Proceedings of the 1st ACM International Health Informatics Symposium, pp. 220–229. ACM (2010)

    Google Scholar 

  14. Maji, H., Prabhakaran, M., Rosulek, M.: Attribute-based signatures: Achieving attribute-privacy and collusion-resistance. IACR Cryptology ePrint Archive 2008, 328 (2008)

    Google Scholar 

  15. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 79(9), 1338–1354 (1996)

    Google Scholar 

  16. Neuman, B.: Proxy-based authorization and accounting for distributed systems. In: Proceedings the 13th International Conference on Distributed Computing Systems, pp. 283–291. IEEE (1993)

    Google Scholar 

  17. Park, H.-U., Lee, I.-Y.: A digital nominative proxy signature scheme for mobile communication. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 451–455. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  18. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  19. Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 198–216. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  20. Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. IACR Cryptology ePrint Archive 2009, 126 (2009)

    Google Scholar 

  21. Sun, H.-M., Lee, N.-Y., Hwang, T.: Threshold proxy signatures. In: IEE Proceedings-Computers and Digital Techniques, vol. 146, pp. 259–263. IET (1999)

    Google Scholar 

  22. Wu, W., Mu, Y., Susilo, W., Seberry, J., Huang, X.: Identity-based proxy signature from pairings. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 22–31. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  23. Xu, J., Zhang, Z., Feng, D.: ID-based proxy signature using bilinear pairings. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) ISPA-WS 2005. LNCS, vol. 3759, pp. 359–367. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  24. Yang, P., Cao, Z., Dong, X.: Fuzzy identity based signature. IACR Cryptology ePrint Archive 2008, 2 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, X., Ma, J., Xiong, J., Zhang, T., Li, Q. (2013). Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing. In: Pathan, M., Wei, G., Fortino, G. (eds) Internet and Distributed Computing Systems. IDCS 2013. Lecture Notes in Computer Science, vol 8223. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41428-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41428-2_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41427-5

  • Online ISBN: 978-3-642-41428-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics