Loading

Securing E-health Data using Ciphertext-Policy Attribute-Based Encryption with Dynamic User Revocation
Mohammed Ali Kamoona1, Ahmad Mousa Al Tamimi2

1Mohammed Ali Kamoona, Computer Science, Applied Science Private University, Jordan.
2Ahmad Mousa Al Tamimi, Information Technology Applied Science Private University, Jordan.

Manuscript received on 13 August 2019. | Revised Manuscript received on 19 August 2019. | Manuscript published on 30 September 2019. | PP: 7244-7250 | Volume-8 Issue-3 September 2019 | Retrieval Number: C6309098319/2019©BEIESP | DOI: 10.35940/ijrte.C6309.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: E-health systems hold a massive amount of medical data that is stored and shared across healthcare service providers to deliver health facilities. However, security and privacy worries increase when sharing this data over distributed settings. As a result, Cryptography techniques have been considered to secure e-health data from unauthorized access. The Ciphertext Policy Attribute-Based Encryption (CP-ABE) is commonly utilized in such a setting, which provides role-based and fine-grained access control over encrypted data. The CP-ABE suffers from the problem of user revocation where the entire policy must be changed even when only one user is revoked or removed from the policy. In this paper, we proposed a CP-ABE based access control model to support user revocation efficiently. Specifically, the proposed model associates a unique identifier to each user. This identifier is added to the policy attributes and removed dynamically when the user is added/revoked. A tree structure (PolicyPathTree) is designed specifically for our model. It can facilitate fast access to policy’s attributes during the verification process; The model is analyzed using Information Theory Tools. Results show that our model outperforms other notable work in terms of computational overheads.,
Keywords: Access Control, e-Health Security, Attribute-Based Encryption, User Revocation, CP-ABE.

Scope of the Article:
Health Monitoring and Life Prediction of Structures