You are on page 1of 11

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 18, NO.

4, JULY 2014 1431

A Review on the State-of-the-Art Privacy-Preserving


Approaches in the e-Health Clouds
Assad Abbas and Samee U. Khan, Senior Member, IEEE

Abstract—Cloud computing is emerging as a new computing The e-Health necessitates entire restructuring and digitalization
paradigm in the healthcare sector besides other business domains. of healthcare infrastructure, including production, supply, and
Large numbers of health organizations have started shifting the management [4]. The new paradigm, for provision of ubiqui-
electronic health information to the cloud environment. Introduc-
ing the cloud services in the health sector not only facilitates the tous health services at affordable prices, has been adopted by
exchange of electronic medical records among the hospitals and countries, such as USA [5], Canada [6], U.K. [7], Korea [4], and
clinics, but also enables the cloud to act as a medical record stor- European Union [8]–[10].
age center. Moreover, shifting to the cloud environment relieves Several healthcare providers and insurance companies today
the healthcare organizations of the tedious tasks of infrastructure use one or the other form of electronic medical record systems.
management and also minimizes development and maintenance
costs. Nonetheless, storing the patient health data in the third- Usually, a patient may have many healthcare service providers,
party servers also entails serious threats to data privacy. Because including primary care physicians, specialists, and therapists.
of probable disclosure of medical records stored and exchanged In addition, a patient may register with several health insurance
in the cloud, the patients’ privacy concerns should essentially be companies for different types of insurances, such as medical,
considered when designing the security and privacy mechanisms. dental, and vision [11]. Consequently, the EHR of a patient
Various approaches have been used to preserve the privacy of the
health information in the cloud environment. This survey aims to may exist at various locations in the healthcare community net-
encompass the state-of-the-art privacy-preserving approaches em- works. From the clinical standpoint, it is important to access the
ployed in the e-Health clouds. Moreover, the privacy-preserving ap- up-to-date integrated patient health information [12]. However,
proaches are classified into cryptographic and noncryptographic sharing and integration of the EHRs, that are managed by several
approaches and taxonomy of the approaches is also presented. healthcare providers is slow and costly [11] and requires effec-
Furthermore, the strengths and weaknesses of the presented ap-
proaches are reported and some open issues are highlighted. tive, secure, and low cost mechanisms to share EHRs among
several healthcare providers.
Index Terms—Access control, e-Health cloud, privacy preserv- The requirements for storage and continuous availability
ing, security.
of e-Health data necessitate the use of the cloud computing
services [13]. Cloud computing is emerging as a promising
I. INTRODUCTION paradigm for computing and is drawing the attention from both
academia and industry [14]. The cloud-computing model shifts
HE development of new technologies has deeply influ-
T enced the traditional healthcare practices. Over the past
few decades, technology has seamlessly been integrated into our
the computing infrastructure to third-party service providers that
manage the hardware and software resources with significant
cost reductions [15], [16]. Cloud computing has shown great
lives and has elevated the need for the development of socio- potential to enhance collaboration among different healthcare
technical systems in the healthcare domain. There has been a lot organizations and to fulfill the common requirements, such as
of research in the electronic healthcare area with focus on uti- scale, agility, cost effectiveness, and availability [12]. Moreover,
lizing the electronic patient records for patient monitoring and migration of patient health records to the cloud storage relieves
diagnosis. Provision of health services using digital technology the healthcare providers from the infrastructure management
has been termed as e-Health [1]. Moreover, traditional clini- tasks [17], [18]. Although there is no standard definition of
cal settings with paper-based medical records and prescriptions the e-Health cloud, it can be considered as a platform that, be-
have also advanced to the Personal Health Records (PHRs) and sides storing gigantic volumes of the health data, also serves
the Electronic Health Records (EHRs). The PHRs and EHRs, as a structured management of the health data across multiple
both are the electronic versions of patient health information. healthcare providers. The health data can further be extracted
However, the PHRs are controlled by patients themselves [2]; from different databases for treatments and other analytical pur-
whereas, the EHRs are managed by the healthcare providers [3]. poses [19]. Typically, the cloud consists of layered elements,
such as physical storage, service infrastructure, application, and
communication infrastructure. Moreover, the e-Health cloud in-
frastructure may be 1) implemented internally by the healthcare
Manuscript received February 14, 2013; revised October 14, 2013 and
December 15, 2013; accepted January 10, 2014. Date of publication January
provider (private), 2) maintained by some external party (pub-
16, 2014; date of current version June 30, 2014. lic), 3) or is maintained by the healthcare provider and external
The authors are with the Department of Electrical and Computer Engineer- party together (hybrid) [20]. In [19], Wu et al. uses a private
ing, North Dakota State University, Fargo, ND 58108 USA (e-mail: assad.
abbas@my.ndsu.edu; samee.khan@ndsu.edu).
cloud, whereas [21] and [22] public and hybrid clouds have
Digital Object Identifier 10.1109/JBHI.2014.2300846 been used, respectively.

2168-2194 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications standards/publications/rights/index.html for more information.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on December 07,2020 at 11:46:19 UTC from IEEE Xplore. Restrictions apply.
1432 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 18, NO. 4, JULY 2014

Nevertheless, automated PHRs are exposed to possible abuse privacy preserving is considerably more than merely maintain-
and require security measures based on the identity manage- ing the confidentiality of data. Metri et al. [36] argue that threats
ment, access control, policy integration, and compliance man- to the data privacy in the cloud include spoofing identity, tam-
agement [23]–[26], [27]. In [28], it is claimed that storing huge pering with the data, repudiation, and information disclosure.
volumes of patients’ sensitive medical data in third-party cloud In spoofing identity attack, the attacker pretends to be a valid
storage is susceptible to loss, leakage, or theft. Moreover, tradi- user whereas data tampering involves malicious alterations and
tional network security mechanisms are also not sufficient for modification of the content. Repudiation threats are concerned
the data outsourced for storage [29]. Therefore, confidential- with the users who deny after performing an activity with the
ity and integrity of the stored health data is deemed as one of data. Information disclosure is the exposure of information to
the major challenges elevated by the external storages. In [30], the entities having no right to access information [36]. The
Kamara and Lauter articulates that using cryptographic storage same threats prevail for the health data stored and transmitted
significantly enhances security of the data. Particularly, in the on the third-party cloud servers. Essentially, the cloud service
public cloud environment operated by the commercial service providers should completely recognize as well as deal with the
providers and shared by several other customers, data privacy security concerns in the cloud to enhance the trust level of the
and security is the most anticipated requirement. patients and healthcare organizations [37]. In the United States
Various mechanisms have been developed to preserve and for example, use and disclosure of the Protected Health Informa-
enhance the privacy of the e-Health systems in the cloud envi- tion (PHI) should be in accordance with the requirements of the
ronment. We present an overview of the most common privacy Health Insurance Portability and Accountability Act (HIPAA).
preserving approaches that have been used in the e-Health clouds The HIPAA requires that maintaining the confidentiality of the
in particular. To the best of our knowledge, there is no compre- health data is not an option, but an obligation [38].
hensive survey available focusing solely on privacy issues of the Typical entities in a cloud-based health record system are pa-
e-Health cloud. Takabi et al. [24] and Xiao et al. [31] provide an tients, hospital staff, such as doctors, nurses, pharmacies, and
overview of the existing security and privacy issues in the cloud laboratory staff, insurance companies, and the cloud service
environment with the contemporary privacy measures. Ahuja providers. Due to the distributed architecture of the cloud, the
et al. [13] discussed about the current research and trends in the patient EHRs are stored at and shared among many third-party
e-Health cloud with a minimal focus on privacy issues. In [32], providers. Therefore, the data is susceptible to unauthorized ac-
Li analyzes properties of the existing PHRs and identifies the cess and attacks. Various approaches being used to maintain
particular privacy risks. No thorough discussion on the privacy- privacy of the e-Health cloud are based on particular adversarial
preserving approaches pertaining to the e-Health cloud is pre- models. One model assumes the cloud servers as untrusted enti-
sented. In [33], Rosenthal et al. introduce the cloud architecture ties that could possibly disclose the sensitive health information.
for bio-medical applications with discussion on the security and Moreover, such untrusted cloud servers are vulnerable to threats
privacy issues. However, in [20] and [34] the authors have dis- from the internal and external adversaries. The adversaries may
cussed some privacy-preserving efforts particular to the e-Health not only attempt to access the encrypted health data through
clouds. We present taxonomy of the approaches that have been forged credentials but also can gain access to the health data as
used to preserve the health data privacy in the cloud. Besides privileged users. In the second model, threats to the health data
the discussion on the privacy-preserving approaches, the survey stored in the trusted cloud servers can be from the inside adver-
also highlights the strengths and weaknesses of the presented saries. For instance, parts of the data may be saved by a doctor
approaches. Moreover, we discuss the privacy-preserving re- who could subsequently share the data with unauthorized enti-
quirements and report what types of requirements are fulfilled ties, thereby causing the information disclosure [39]. Moreover,
by each of the presented approaches and also highlight some identities of the entities must be kept anonymous and flows of the
open research issues. The rest of the paper is organized as fol- health data from different sources in the cloud must be intricate
lows. Section II discusses the need and requirements of pri- enough to infer the linkablity among them. In the third model,
vacy in the e-Health cloud with the discussion on threat mod- the cloud servers are semitrusted. The semitrusted cloud servers
els. The privacy-preserving approaches used in the cloud-based are usually considered as honest, however, they are curious to
health systems are presented in Section III. Section IV presents obtain as much information about the health data as possible and
comparison of the presented approaches and Section V con- may collude with some malicious users [17]. In such situations,
cludes the discussion and highlights the open research issues and the adversaries may not only tamper the patient health data but
areas. can also share or sell the health information to the unauthorized
parties. For example, the medicine prescribed by a doctor may
be revealed to the representatives of the pharmaceutical com-
II. NEED AND REQUIREMENTS FOR PRIVACY IN THE pany [35] or the expense information pertaining to the insurance
E-HEALTH CLOUD
company may be tampered. Therefore, the health data privacy
Recent trends in the healthcare, centering on accessing the in- preserving in the cloud has multiple requirements to be fulfilled.
formation anytime and anywhere, encourage moving the health- The requirements include integrity, confidentiality, authenticity,
care information towards the cloud. Despite the fact that the accountability, audit, nonrepudiation, anonymity, and unlinka-
cloud offers several benefits, it also entails special threats to the bility [20], [40]. Each of the aforementioned requirements is
health data in terms of privacy and security [35]. The concept of briefly defined next in context of the e-Health systems.

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on December 07,2020 at 11:46:19 UTC from IEEE Xplore. Restrictions apply.
ABBAS AND KHAN: REVIEW ON THE STATE-OF-THE-ART PRIVACY-PRESERVING APPROACHES IN THE e-HEALTH CLOUDS 1433

1) Integrity—to ensure that the health data captured by a


system or provided to any entity is true representation of
the intended information and has not been modified in any
way [31].
2) Confidentiality—to ensure that the health data of pa-
tients is kept completely undisclosed to the unauthorized
entities.
3) Authenticity—ensures that the entity requesting access is
authentic. In the healthcare systems, the information pro-
vided by the healthcare providers and the identities of the
entities using such information must be verified.
4) Accountability—an obligation to be responsible in light of
the agreed upon expectations. The patients or the entities
nominated by the patients should monitor the use of their
health information whenever that is accessed at hospitals,
pharmacies, insurance companies etc.
5) Audit —to ensure that all the healthcare data is secure and Fig. 1. Taxonomy of the privacy preserving approaches in the e-Health cloud.
all the data access activities in the e-Health cloud are being
monitored.
6) Nonrepudiation—repudiation threats are concerned with tographic primitives that are also used to preserve the privacy
the users who deny after performing an activity with the of the health data. These primitives include 1) searchable en-
data. For instance, in the healthcare scenario neither the cryption, 2) (Hierarchical) Identity-Based Encryption (HIBE),
patients nor the doctors can deny after misappropriating 3) Proxy Re-encryption (PRE), 4) Predicate/Hierarchical Pred-
the health data. icate Encryption (HPE), and 5) (Fully) homomorphic encryp-
7) Anonymity—refers to the state where a particular subject tion. In this section, we briefly define and present the approaches
cannot be identified. For instance, identities of the patients based on the PKE, SKE, and several cryptographic primitives
can be made anonymous when they store their health data that are used to preserve the privacy of the e-Health cloud. Fig. 1
on the cloud so that the cloud servers could not learn about presents taxonomy of the privacy-preserving approaches.
the identity. 1) PKE-Based Hybrid Approaches: The PKE technique re-
8) Unlinkability—-refers to the use of resources or items quires two separate keys; one of the keys is private whereas the
of interest multiple times by a user without other users other is public. Solutions based on the PKE are secure but using
or subjects being able to interlink the usage of these re- the PKE alone seems computationally less efficient due to the
sources [41]. More specifically, the information obtained slower operations and the larger key sizes. Therefore, the PKE
from different flows of the health data should not be suffi- is used in combination with the SKE where symmetric keys are
cient to establish linkability by the unauthorized entities. used to encrypt the contents while public/private keys are used to
secure the symmetric keys. Consequently, in this section we term
III. PRIVACY-PRESERVING APPROACHES IN THE the approaches that use the PKE in conjunction with symmet-
E-HEALTH CLOUDS ric cryptographic technique as hybrid approaches. The common
public key algorithms use the RSA and Elliptic Curve Cryptog-
Numerous approaches have been proposed to preserve the
raphy (ECC) techniques for generating public/private param-
privacy of the patient health data. However, there is no clear clas-
eters used for security services. For instance, the RSA-OAEP
sification of the privacy-preserving approaches. Therefore, we
[64] and ECIES [65] are based on the RSA and ECC, respec-
classify the privacy-preserving approaches used in the e-Health
tively. The PKE-based hybrid approaches to protect the health
clouds into 1) cryptographic and 2) noncryptographic ap-
data in the cloud are presented below.
proaches at the top level. The cryptographic approaches to
The authors in [11] presented a reference model for pre-
mitigate the privacy risks utilize certain encryption schemes
serving privacy of the healthcare applications in the untrusted
and cryptographic primitives. Conversely, noncryptographic ap-
cloud. The authors emphasized on a patient centric, role-based
proaches mainly use policy-based authorization infrastructure
EHR model that allows the users to maintain anonymity. The
that allows the data objects to have access control policies. Cryp-
model uses an anonymous signature scheme called group signa-
tographic and noncryptographic privacy-preserving approaches
tures [66] for authenticity and integrity of the EHRs. The group
are presented in Section III-A and Section III-B.
signature scheme allows a group member to anonymously sign
a message on behalf of all the group members. Moreover, the
A. Cryptographic Approaches
authors suggested maintaining the logs of all the accesses and
The cryptographic approaches commonly used in the modifications to the EHRs.
e-Health cloud-based systems to protect data use encryption Jafari et al. [42] presented a model to allow such a patient-
schemes, such as Public Key Encryption (PKE) and Symmetric centric control over the EHRs that restricts the patients to mod-
Key Encryption (SKE). However, there are some other cryp- ify the contents authored by other parties, such as doctors and

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on December 07,2020 at 11:46:19 UTC from IEEE Xplore. Restrictions apply.
1434 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 18, NO. 4, JULY 2014

lab staff. The authors used the Digital Rights Management systems. In the proposed approach, the data that needs to be
(DRM)-based approach for secure management of the health transmitted and stored on the external storages is automatically
records in the cloud. In the DRM approach, the data is always encrypted through the PKE. When a client machine wants to
stored in an encrypted form and the license is issued by the connect with the TVD, the underlying infrastructure authen-
owner, whereas the policies expressed in the license are en- ticates the integrity of the client platform. However, deploying
forced by the agent. The Content Key Encryption (CKE) is used the TVD-based solutions may result in increased complexity and
in DRM systems to control the electronic content, and more scalability issues in the situations where the security domains
precisely the CKE relates to a DRM system that employs the are implemented on each client machine.
user-based CKE [67]. The data is encrypted using a content key Pecarina et al. [44] presented the PKE-based architecture
and only the users having valid license are allowed to decrypt to ensure enhanced control through anonymity and unlinka-
and use the content. The health record service provider acts as bility in a semitrusted health cloud. The approach introduces
the distributor by providing the protected content only to the the anonymity boundaries between the Cloud Service Provider
authorized users. However, the provider cannot access the con- (CSP) and the users to ensure the selective anonymity of the
tents in clear text form. Patients and physicians are assigned the PHRs while submitting the health records to the cloud. Patients
public and the private keys for encryption and decryption. encrypt their PHRs using the public key of the CSP before stor-
Mashima and Ahamad [39] proposed the system architec- ing at the cloud. The CSP decrypts the records using the private
ture and related protocols that enable either explicit or implicit key, stores the PHR and location, and encrypts them through the
patient control over the heath information. The access control SKE. Pairing the patients’ master key and the encrypted location
mechanism focuses on when and how the patient health informa- permits the CSP to preserve the administrative control on the
tion is accessed. The authors presented the notion of “account- cloud storage.
able usage” and the updated health records to enable robust pa- 2) Approaches Based on the SKE: The SKE uses the same
tient centric monitoring. The records are encrypted through the keys for encryption and decryption. The SKE-based schemes
PKE with corresponding hash values. Moreover, to ensure the are effective in securing the data but introduce additional com-
usage of record by only trusted entities, the concept of Univer- plexity in the EHR systems as they may require additional pro-
sal Designated Verifier Signatures (UDVS) is introduced. The cedures to implement the access control [51]. The SKE-based
UDVS function as standard digital signatures that are publicly algorithm currently in use and acting as standard is the Advanced
verifiable. The signatures have additional capability of designat- Encryption Standard (AES). The AES was recommended as a
ing the signature to any designated verifier [68]. However, the standard by the National Institute of Standards and Technology
proposed scheme exhibits drawback in assuming that the health (NIST) after the limitations of the Data Encryption Standard
data is first created by record issuers that have knowledge about were exposed [70]. Moreover, there are also some commonly
the contents of records, hash values, and signatures. If such in- used stream ciphers, such as RC4and A5/1. The SKE-based ap-
formation is disclosed, then the monitoring system would not proaches to protect the health data in the cloud are presented
be able to effectively manage the access control. below.
Kaletsch and Sunyaev [21] proposed a framework called On- A mechanism for unlinkability between the patients and elec-
line Referral and Appointment Planer (ORAP) to support se- tronic medical records in the cloud environment is presented by
cure exchange of the EHRs from general health practitioners to Li et al. [59]. The patients’ electronic medical records are en-
specialist doctors. In the ORAP security model, the EHRs are crypted through the SKE and are stored in an anonymous way.
only stored at the physicians’ practice places, that are consid- The doctors use digital signatures to process the patient health
ered as the only trusted environment. The EHRs are encrypted records after the treatment for storage at the cloud. The Elec-
and signed before transmission to the central cloud storage and tronic Medical Record number (PID), identity seed stored inside
can be decrypted by the receiving specialists only. The ORAP the Patients’ Health Card (SID), a random value (R), and a serial
uses German Healthcare Telematics Infrastructure components number for treatment (SN) are required to access the patients’
to provide the secure encryption and signatures for all docu- electronic medical record. Moreover, to access the heath data,
ments transferred particular to the patients’ health. The frame- a smart card is required that contains the SID. Furthermore, the
work uses Amazon’s S3 Cloud for temporary storage of large PID is stored in two parts separately that restricts the illegitimate
scaled attachments that are obviously considered as encrypted. access over the patient data.
However, the ORAP lacks in integration of patient centric func- Chen et al. [22] used the SKE to encrypt the patient health
tions that makes it less flexible in providing role-based access. data file in normal and emergency situations. The approach
A solution to address the security issues particular to the end- ensures data privacy in a hybrid cloud for sharing the EHRs.
user platforms and external storage is presented in [43]. The pre- The patients’ health data is stored on the hospital’s private cloud
sented architecture consists of Trusted Virtual Domains (TVD) as well as on the public cloud of the healthcare provider. The
to establish the access control. The TVDs are combinations of patients’ medical records can only be decrypted through the
different virtual machines that trust on each other and have com- private content key that is split randomly and stored in two
mon security policies. The TVD platforms contain the security different parts. One of the keys is escrowed at the hospital server,
kernel and other physical components that virtual machines may while the other is stored at the smart card owned by the patient.
utilize to enforce the policies [69]. A major advantage of using Therefore, only the authorized users can have access to the
the TVD approach is its flexibility of integration with the legacy patient EHRs.

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on December 07,2020 at 11:46:19 UTC from IEEE Xplore. Restrictions apply.
ABBAS AND KHAN: REVIEW ON THE STATE-OF-THE-ART PRIVACY-PRESERVING APPROACHES IN THE e-HEALTH CLOUDS 1435

A dynamic access structure to enforce precise access control TABLE I


ATTRIBUTES IN ATTRIBUTE-BASED ENCRYPTION APPROACHES
over the PHRs in multiuser cloud environment is introduced by
Chen et al. [60]. The health records are encrypted and decrypted
through Lagrange multipliers using the SKE. The approach al-
lows the data owners to generate and share the keys. An impor-
tant feature of the approach is automatic revocation of the users.
However, the task is costly in terms of computations. The com-
plexities of key management to grant access dynamically over
the PHRs are reduced by managing a partial order relationship
among the users.
A role-based and time-based access control approach is in-
troduced by Zhang et al. [61]. The approach is effective in
storing the encrypted EHRs on the untrusted clouds and solves
the issues of key distribution among the legitimate users. The
approach applies time-bound hierarchical key management that
allows the legitimate users to access the EHRs for a specific Broadcast ciphertext-policy attribute-based encryption
period of time, based on their access roles. For time-bound hi- (bABE)—is effective in direct revocation of the user keys
erarchical key management, see [71].The EHRs are encrypted without the need of refreshing system parameters or data re-
through the SKE. However, the approach is limited in the sense encryption. Although, the bABE ensures the health data con-
that it requires a user to work in multiple roles. Consequently, fidentiality, it causes increased computational overheads in en-
the users have to possess and manage multiple keys. forcing the access policies.
3) Approaches Based on Alternative Cryptographic Prim- Some of the privacy-preserving approaches based on the ABE
itives: In this section, we present the privacy-preserving ap- and its variations, used in the e-Health cloud systems are pre-
proaches based on cryptographic primitives mentioned earlier. sented below. Table I presents the attributes that are used to
a) Attribute-based encryption (ABE) approaches: specify the access policies.
Attribute-based encryption (ABE)—introduced by Sahai The issues of concurrently achieving the fine-grained ac-
et al. [72], the ABE is a cryptographic primitive based on cess, scalability, and confidentiality of the outsourced data are
the PKE where the messages can be encrypted and decrypted addressed by Yu et al. [17]. The data encrypted by a single
on the basis of user attributes. A ciphertext can be decrypted owner is subsequently shared with multiple users by distribut-
only when the attributes and the decryption keys are available. ing the keys. To enable data owner to delegate the computational
The ABE enables the users to selectively share the encrypted tasks to the untrusted cloud servers, the access policies based on
data and also provides a fine-grained access [73]. Usually, the the attributes are enforced. The approach ensures the account-
attribute-based approaches are considered as costly in terms ability of the users’ secret keys. In the proposed approach the
of decryption because of bilinear computation steps [56]. The tasks of re-encrypting the data files and updating of the secrete
variants of the ABE are briefly presented as follows. keys are delegated to the cloud servers. To deal with the heavy
Ciphertext policy attribute-based encryption (CP-ABE)— computation overheads caused by reencryption of data files and
first introduced in [74], a message in the CP-ABE is encrypted update of secret key, the KP-ABE, PRE, and lazy reencryption
under an access policy that defines the access structure, whereas are combined. The purpose of lazy reencryption is to restrict the
the users’ private keys are associated with a set of attributes. revoked users from learning the updated contents and keys if
Later, Zhou and Huang [75] in their construction reduced the the file contents have been modified after user revocation.
size of ciphertext from the linear to a constant size. However, Thomas et al. [45] proposed an ABE-based architecture to
the CP-ABE is limited in terms of specifying the access policies preserve the confidentiality of the EHRs. The authors used
and management of the user attributes. the ABE and the PKE for scalable authorization secrets. The
Key policy attribute-based encryption (KP-ABE)—in contrast patient’s smart card and PIN are used for authorization and
to the CP-ABE, the access policies in the KP-ABE are associated authentication using the PKE. The patient is provided with a
with the private key whereas a set of descriptive attributes is used Transaction Access Code (TAC) that may be sent to a physician
to label the ciphertext [72]. A user can decrypt the ciphertext via a telephone or through any other remote mechanism. The
only if the data attributes satisfy the defined access structure. physician in turn creates an EHR and once the TAC is verified,
However, the KP-ABE is limited in allowing the encryptor to the EHR is encrypted and sent to the storage provider. The de-
decide about the decryptor of the data. cryption operation requires the health professional to obtain the
Multiauthority attribute-based encryption (MA-ABE)— TAC and acquire authentication from the Private Key Generator
allows the users’ keys to be collectively generated by multiple (PKG). Ruj et al. [48] also proposed an ABE-based access con-
trusted authorities that are responsible for governing the subsets trol mechanism to maintain anonymity of the users storing the
of the users’ attributes. The user obtains a part of the secret key PHRs on the cloud. Although, the identity of the entities storing
from each trusted authority, thereby preventing collusion [76]. the data is hidden, their credentials are verified. The approach
For situations that require access rights based on identities, the is resistant to replay attacks and accomplishes the distribution
ABE is considered as an inefficient technique. of the keys in a decentralized fashion.

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on December 07,2020 at 11:46:19 UTC from IEEE Xplore. Restrictions apply.
1436 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 18, NO. 4, JULY 2014

An attribute-based infrastructure for the EHRs where the pa- cient. Suhair et al. [51] also used the CP-ABE to encrypt the
tients encrypt their EHR files using the bABE is presented by EHRs based on the healthcare providers’ attributes or creden-
Nararyan et al. [46]. The bABE effectively makes plaintext tials in a multi-owner cloud setting. The healthcare providers
accessible to the users satisfying the policies attached to the share one public key for the EHR encryption and consequently,
ciphertext, with an additional functionality of user revocation. avoid the distribution and management overheads of the public
The approach solves the key management issues by using the keys. Akinyele et al. [52] also proposed a flexible approach us-
users’ attributes for data encryption thereby, allowing every user ing the ABE to offer a secure encryption of the electronic health
to have only one private key for their attribute set for decryption. data when it is being transferred to the storage outside the trust
The approach also allows users to carry out private searches for boundaries of the healthcare organization. The approach allows
the corresponding keywords over the encrypted data without generation of the self-protected electronic medical records that
revealing the keywords or partial matches to the cloud system. can be stored at the cloud servers as well as cell phones to
Moreover, the system permits the healthcare providers to per- ensure availability when the provider is offline. A policy en-
form keyword-based searches on the patients’ records. The key- gine generates the access policies over the medical record(s)
word search functionality is provided by combining the bABE according to the user types (physician, patient, and insurance
and the Public-Key Encryption with Keyword Search (PEKS) agent). Moreover, the policy engine identifies a set of attributes,
approach originally presented by Boneh et al. [77]. such as record type, patient age, and date to encrypt the records
Li et al. [49] used the ABE to manage the access control using the CP-ABE. Likewise, the CP-ABE has also been used
over the health data in multi-owner, multi-authority, and mul- in [76], [79]–[81], and [82] for secure storage and exchange of
tiuser cloud environment. The patients are capable of setting the PHRs on the cloud.
their own preferences, generating the decryption keys using the b) Approaches based on miscellaneous cryptographic
MA-ABE, and subsequently distributing the keys to the autho- primitives: In this section, we present the privacy-preserving
rized users. Moreover, the attributes are managed in distributed approaches based on the cryptographic primitives other than the
fashion by each authority. To minimize the complexity of key ABE.
distribution, the system has been divided into multiple security Searchable encryption —is an important cryptographic primi-
domains and each domain is responsible for managing only a tive that permits to perform search operations over the encrypted
limited set of users. The proposed scheme is claimed to be flexi- data without revealing the information about the contents and
ble in supporting efficient and on-demand revocation of the user the user query to the untrusted servers [83]. The first practi-
access rights. Nevertheless, the proposed approach suffers from cal approach using searchable encryption based on symmetric
excessive computational overhead at the data owner side. Li key cryptography was introduced in [83], whereas the authors
et al. [50] extended the work presented in [49] and proposed an- in [77] were the first to introduce the public key searchable en-
other framework for secure sharing of the PHRs in multiowner cryption. However, the searchable encryption techniques suffer
environment that divides the PHRs into different sub-domains. from issues of functional usability and computational ineffi-
The use of the MA-ABE is extended to the public domains. The ciencies. The approaches presented in [46], [53], and [54] allow
approach minimizes the intricacies and costs of key manage- searching over the encrypted EHRs.
ment for users and data owners while augmenting the privacy Predicate encryption and hierarchical predicate encryption
guarantees. To encrypt the patient health record, the ABE is (HPE)—Predicate encryption is a PKE-based paradigm used
used. Moreover, the approach presented in [49] is improved in to offer fine-grained access control over the encrypted data. In
terms of efficient management and on-demand user/attribute re- predicate encryption, the secret keys correspond to the predi-
vocation. Although the approach enhances the scalability of the cates and these secret keys are used to decrypt the ciphertext as-
system, it is unable to efficiently handle the situations where data sociated with the attributes corresponding to the predicate [84].
access rights are granted based on the users’ identities instead The HPE is a cryptographic primitive that facilitates the dele-
of the attributes. Another MA-ABE-based framework to offer gation of the search capabilities. However, the delegated users
patient centric access over the PHRs is presented in [78]. The have more restrictive capabilities as compared to the delegating
framework assumes multiple owners of the PHRs and divides user [53], [85]. The HPE-based schemes can be used to realize
the entire system into different security domains and personal the searchable encryption.
domains. Identity-based encryption—Shamir [86] first introduced the
An approach called Efficient and Secure Patient-centric Ac- notion of identity based cryptography. However, a fully func-
cess Control Scheme (ESPAC) for the cloud storage using the tional Identity Based Encryption (IBE) scheme was introduced
CP-ABE is presented by Barua et al. [47]. The scheme per- by Boneh and Franklin [87]. The IBE uses any string for in-
mits access to the health data based on access privileges. The stance, a name or an email address as the public key and the
ESPAC uses the IBE for secure transmission of the data between corresponding decryption keys are issued by a trusted party. A
the remote patient and the e-Health cloud provider; whereas, variant of the IBE called the Hierarchical IBE (HIBE) allows
the access control is realized by using the CP-ABE. The per- multiple PKGs arranged in a hierarchical form to easily handle
formance results show that the ESPAC scheme is applicable to the task of private key generation [88]. An HIBE approach to
resist the DOS attacks in a dual server mode. However, lack of protect the EHRs is presented in [54].
dynamicity and flexibility in patient data attainment and then Proxy-reencryption (PRE)—is a cryptographic primitive that
transmitting to the hospital servers makes this approach ineffi- allows a semitrusted proxy to convert theciphertext encrypted

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on December 07,2020 at 11:46:19 UTC from IEEE Xplore. Restrictions apply.
ABBAS AND KHAN: REVIEW ON THE STATE-OF-THE-ART PRIVACY-PRESERVING APPROACHES IN THE e-HEALTH CLOUDS 1437

under the public key of one user into a ciphertext that can be clients and the mobile health (mHealth) service providers. The
decrypted through the other user’s private key [89]. adversarial model assumes the honest but curious server. The
(Fully)Homomorphic Encryption (FHE)—homomorphic en- approach deals with the insiders who commit deliberate or non-
cryption is a particular type of encryption that permits computa- intentional attacks to obtain information. The privacy of clients
tions on ciphertexts and also results are obtained in an encrypted is protected using identity-based encryption. Moreover, the ap-
form. The concept of FHE presented by Gentry [90] allows eval- proach uses homomorphic encryption while transferring the data
uating arbitrary number of additions and multiplications over the from the mobile health provider to the cloud. The homomorphic
encrypted data without being able to decrypt. Another homo- encryption is effective in performing the meaningful computa-
morphic scheme called “Somewhat Homomorphic Encryption tions over the encrypted data [58]. The decryption complexi-
(SwHE)” performs limited numbers of homomorphic operations ties of the client or the health provider are alleviated by using
by evaluating circuits of some specified depth. The FHE-based the outsourcing decryption technique [92] and the key privacy
solutions seem less practical because of their inefficiency. How- proxy re-encryption, without compromising on the privacy of
ever, Lauter et al. [58] argue that the SwHE in some scenarios, the involved parties. In [57], the authors introduced a multiparty
such as medical and financial has proved really practical. computational approach using the homomorphic encryption to
Li et al. [53] addressed the issues associated with Authorized process the encrypted ECG signals while preserving the pa-
Private Keyword Searches (APKS) on the encrypted EHRs in tients’ privacy. Lauter et al. [58] also applied SwHE to enable
the cloud environment under the authorization of local trusted the cloud to perform computations over the encrypted patient
authorities. The threat model assumes that the cloud server is data on patients’ behalf.
honest but curious to learn the data contents by honestly follow-
ing the protocol. The authors proposed solution for the APKS
based on the cryptographic primitive called the HPE. Besides
documents and query privacy, the proposed scheme supports B. Noncryptographic Approaches
multi-dimensional multiple keyword searches, delegation, and Quite a few noncryptographic approaches have been pro-
revocation of search capabilities. By using the attribute hierar- posed to preserve privacy of the health data in the cloud. The
chy, the technique not only enhances the search efficiency but noncryptographic approaches mainly use certain policy-based
also improves the query privacy. authorization infrastructure that allows the data objects to have
Benaloh et al. [54] presented a Patient Controlled Encryption access control policies. Some of the aforementioned systems
(PCE)-based electronic medical record system that allows pa- also use few cryptographic primitives, such as hash functions
tients to generate and share the encryption keys for delegation and digital signature verification. Below, we present the systems
of the access rights. The EHRs are partitioned in a hierarchical that use the noncryptographic approaches for preserving privacy
structure using the HIBE. Each section of the structure is en- in the e-Health cloud.
crypted with a public key that is managed by the patients. The Fan et al. [8] developed the Data Capture and Auto Identi-
authors used the PKE to store the data in encrypted form over fication Reference (DACAR) platform to deal with the issues
third-party storage. The decryption operation requires a sub- of security, integrity, confidentiality, and integration of various
key that is derived from a master private key. The decryption health services. The DACAR makes use of the private cloud
keys are distributed by the patients to grants access over certain for data storage and the hybrid cloud for hosting the services.
parts of the medical record. Moreover, the approach provides an To integrate different health services, the DACAR uses Service
efficient mechanism for searchability of the encrypted data. Oriented Architecture (SoA). The DACAR architecture consists
Leng et al. [55] proposed an approach that allows the owner of of three layers. The bottom layer deals with security and confi-
the PHRs to delineate the access control through sticky policies dentiality mechanism. The Single Point of Contact is the mid-
before uploading the PHRs on the cloud. The sticky policies are dle layer used to fulfill the authorization requirements. The top
employed to regulate the access and usage of data and accom- layer has data buckets, ID mapping, and audit trial services. The
pany the data. The entities satisfying the access requirements database level encryption, digital signature verification, hashing,
specified in the sticky policies are allowed to access the data. and integrity check-sum are applied on the DACAR platform
The approach uses a cryptographic primitive called Conditional to grant the access to the trustworthy individuals, roles, and
Proxy Re-encryption (C-PRE) to enforce the fine-grained ac- application services.
cess over the PHRs. In the C-PRE as compared to the PRE, the Wu et al. [12] proposed broker-based authorization approach
delegator categorizes plaintexts into portions and also the per- for selective sharing of the composite EHRs from the multiple
missions to decrypt each portion are delegated through a proxy healthcare service providers. The approach introduces an EHR
under the same pair of keys. The approach assumes the presence aggregator for retrieval and aggregation of the distributed EHRs
of multiple trusted authorities in the PHR system. The trusted among multiple clouds to construct the virtual composite EHRs.
authorities ensure the enforcement of the sticky policies besides Moreover, a policy manger supports the specification and en-
authorizing the users to get the decryption keys for read and forces the access control policies. Based on the composite EHR
write operations. A more practical construction based on the schema, the EHR instances from different healthcare domains
PRE is presented in [91]. can be integrated. However, the access control policy infrastruc-
Lin et al. [56] presented a cloud-assisted privacy-preserving ture may come across the policy composition issues in case of
mobile health monitoring system to preserve privacy of the multiple healthcare providers.

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on December 07,2020 at 11:46:19 UTC from IEEE Xplore. Restrictions apply.
1438 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 18, NO. 4, JULY 2014

TABLE II
COMPARISON OF PRIVACY PRESERVING APPROACHES

Chadwick and Fatema [62] presented an approach where pa- as the cloud data is still susceptible to disclosure threats by the
tients’ privacy policies are stuck with the data indicating who cloud service providers.
could have access to the data. The authors introduced a master Haas et al. [40] presented an approach that not only allows
policy decision point to support multiple sub-ordinate policy the patients to audit the access over the EHRs but also enables
decision points. The cloud application developers use the Ap- them to identify the sources of data leak. A policy-based access
plication Independent Policy Enforcement Point (AIPEP) to call structure is introduced that prevents the linking of different data
the authorization services. The AIPEP accepts web service re- sets for a single patient. The data before writing to the external
quests from applications and formulates web service decision storage is passed to a pseudonymity service that ensures the
responses to the application. The authorization infrastructure anonymity of the data. The data is further encrypted with a
inquires whether the users have read permissions. If the infras- unique key before storage on a third-party server. By tracing the
tructure is unable to support a sticky policy, then the sender data flows the approach ensures the auditing of the health data.
of the query is informed about the fact as well. The validation A cloud-based PHR system called MyPHRMachines that al-
tests of infrastructure were conducted by running the authoriza- lows patients to build their personal health data repository is
tion services on a small cloud server. Nonetheless, the proposed presented in [63]. After upload the PHRs on MyPHRMachine,
policy-based infrastructure does not obviate the need for trust the patient can access the PHRs through Virtual Machine (VM)

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on December 07,2020 at 11:46:19 UTC from IEEE Xplore. Restrictions apply.
ABBAS AND KHAN: REVIEW ON THE STATE-OF-THE-ART PRIVACY-PRESERVING APPROACHES IN THE e-HEALTH CLOUDS 1439

to delegate the access rights selectively to individual caregivers noncryptographic approaches. Moreover, we have developed
(general physician, hospital, and insurance companies). The taxonomy of the techniques that have been applied to preserve
caregivers are provided access to VMs through a ciphered VM the privacy of the existing data. We also presented a detailed
identifier via email. The patients can monitor the PHRs through comparison of the privacy-preserving approaches from the per-
the remote desktop protocol and shutdown the VM session if spective of the fulfillment of the privacy-preserving require-
they realize a misuse of PHR data. All of the communication is ments and key management overhead. Despite all the efforts
protected using the SSH protocol that besides others, effectively made to enhance the privacy of the electronic health data, there
counters the Man-In-The-Middle attacks. are certain areas and issues still open and need more attention.
We briefly highlight the issues as under:
IV. COMPARISON OF THE PRIVACY-PRESERVING APPROACHES An important issue that arises due to the nature of the cloud
is secure provenance. Generally, the provenance may include
A detailed comparison of the presented approaches in terms
tracking and monitoring of 1) actions taken, 2) the entities tak-
of the privacy requirements is provided in Table II. As can
ing the actions, 3) the location of the actions, and 4) the reason
be observed that majority of the presented techniques fulfill
for action [93]. Although the health cloud environment is pro-
the privacy-preserving requirements, such as integrity, confi-
tected against the privacy threats, still provenance of the health
dentiality, authenticity, accountability, and audit. However, the
data may reveal sensitive information to the unauthorized in-
requirements, such as nonrepudiation, anonymity, and unlink-
dividuals by monitoring the sequence of the events. Therefore,
ability are met by only a few techniques. There appears an
it is highly desirable that the mechanisms should be developed
important relationship between the anonymity and unlinkabil-
to deploy efficient auditing and accountability mechanisms that
ity and most of the presented approaches maintain unlinkability
anonymously monitor the utilization of health records and track
through anonymity. Another important observation is particular
the provenance to ensure the confidentiality of the data.
to the ABE-based approaches. The ABE approaches may prop-
Likewise, searchable encryption approaches based on PKE
agate the keys to the unwanted users having attributes similar
presented are computationally far less efficient as compared to
to the legitimate users. Nonetheless, the ABE approaches have
symmetric key approaches [56]. Consequently, there is a sig-
been quite effectively utilized to achieve a desired level of pri-
nificant need to devise more usable and efficient data search
vacy. We also observe that most of the presented cryptographic
strategies without compromising on privacy of the cloud envi-
techniques have successfully been able to minimize the key
ronment in general and the e-Health clouds in particular.
management overheads despite of their inherent complexities.
Another important issue worth investigating is determining
For instance, the PKE is considered as less efficient in terms of
and verifying the integrity of the health data in the cloud en-
computation whereas the ABE has a standing of costly decryp-
vironment. Although existing privacy preserving mechanisms
tion primitive because of bilinear computations. However, the
offer support to maintain the integrity of data in the cloud, as-
presented schemes in this survey based on the aforementioned
similating the integrity verification mechanism with the existing
cryptographic schemes sufficiently minimized the key manage-
solutions will offer the patients and the data owners to realize
ment overhead. The noncryptographic approaches can never be
an increased sense of control over the data.
truly secure in public clouds because they are susceptible to
information disclosure by some insiders or the other hackers.
However, noncryptographic approaches when used only in pri- ACKNOWLEDGMENT
vate clouds preserve the privacy to a desired level because the The authors would like to thank U. S. Khan, M. Ali,
infrastructure in such cases is trusted. Therefore, for systems S.-ur-Rehman Malik, K. Bilal, and N. Jabeen for the valuable
operating in public or hybrid clouds, using reasonably strong reviews, suggestions, and comments.
cryptography is highly important.
In Table II, “” and “×”symbols represent whether a partic-
REFERENCES
ular privacy-preserving requirement is fulfilled or not, respec-
tively whereas “-” represents that a particular requirement is not [1] D. Slamanig and C. Stingl, “Privacy aspects of e-health,” in Proc. 3rd
IEEE Int. Conf. Availability, Rel. Security, Mar. 2008, pp. 1226–1233.
discussed. Moreover, in Table II, due to space limitations, the [2] D. C. Kaelber, A. K. Jha, D. Johnston, B. Middleton, and D. W. Bates,
privacy-preserving requirements are abbreviated as follows: “A research agenda for personal health records (PHRs),” J. Am. Med.
Integrity: IN, Confidentiality: CO, Authenticity: AU, Ac- Informat. Assoc., vol. 15, no. 6, pp. 729–736, 2008.
[3] L. C. Huang, H. C. Chu, C. Y. Lien, C. H. Hsiao, and T. Kao, “Privacy
countability: AC, Audit: AT, Nonrepudiation: NR, Anonymity: preservation and information security protection for patients’ portable
AN, Unlinkability: UN. electronic health records,” Comput. Biol. Med., vol. 39, no. 9, pp. 743–
750, 2009.
[4] H. J. Cheong, N. Y. Shin, and Y. B. Joeng, “Improving korean service
V. CONCLUSION AND OPEN RESEARCH ISSUES delivery system in health care: Focusing on national e-health system,”
in Proc. IEEE Int. Conf. e-Health, Telemedicine Social Med., Feb. 2009,
The privacy of the electronic health data in the cloud- pp. 263–268.
computing environment is a serious issue that requires special [5] (2012, Dec. 24). “Federal health IT initiatives,” [Online]. Available:
considerations. We have presented a state-of-the-art review on http://www.hhs.gov.
[6] (2012, Dec. 24). “Canada health infoway,” [Online]. Available:
the approaches and methodologies that are currently being used http://www.infoway-inforoute.ca
to deal with the important issue of privacy. We have catego- [7] J. Dzenowagis and G. Kernen, “Connecting for health: Global vision, local
rized the privacy-preserving approaches into cryptographic and insight,” World Health Organization, Z699.5.M39, 2005, pp. 1–36.

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on December 07,2020 at 11:46:19 UTC from IEEE Xplore. Restrictions apply.
1440 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 18, NO. 4, JULY 2014

[8] L. Fan, W. Buchanan, C. Thummler, O. Lo, A. Khedim, O. Uthmani, tion sharing,” J. Biomed. Informatics, vol. 43, no. 2, pp. 342–353,
A. Lawson, and D. Bell, “DACAR platform for e-health services cloud,” 2010.
in Proc. 4th IEEE Int. Conf. Cloud Comput., Jul. 2011, pp. 219–226. [34] A. J. L. Fernández, I. C. Señor, P. Á. Oliver L., and A. Toval, “Security
[9] P. G. Goldschmidt, “HIT and MIS: Implications of health information and privacy in electronic health records: A systematic literature review,”
technology and medical information system,” Commun. ACM, vol. 48, J. Biomed. Informat., vol. 46, pp. 541–562, 2013.
no. 10, pp. 69–74, Oct. 2005. [35] N. Dong, J. Hugo, and J Pang, “Challenges in e-health: From enabling
[10] E. Davidson and D. Heslinga, “Bridging the IT adoption gap for small to enforcing privacy,” in Foundations of Health Informatics Engineering
physician practices: An action research study on electronic health records,” and System. Berlin, Germany: Springer, 2012, pp. 195–206.
ACM J. Inf. Syst. Manag., vol. 24, no. 1, pp. 15–28, Jan. 2007. [36] P. Metri and G. Sarote, “Privacy issues and challenges in cloud comput-
[11] R. Zhang and L. Liu, “Security models and requirements for healthcare ing,” Int. J. Adv. Eng. Sci. Technol., vol. 5, no. 1, pp. 001–006, 2011.
application clouds,” in Proc. 3rd IEEE Int. Conf. Cloud Comput., Miami, [37] S. Allen. (2012, Dec. 20). “Cloud computing and health care security,”
FL, USA, Jul. 2010, pp. 268–275. [Online]. Available: http://cloudcomputing.syscon.com/node/1796151,
[12] R. Wu, G.-J. Ahn, and H. Hu, “Secure sharing of electronic health records 2011
in clouds,” in Proc. 8th IEEE Int. Conf. Collaborative Comput., Netw., [38] (2013, Jan. 4), Health Insurance Portability and Accountability [Online].
Appl. Work-sharing, 2012, pp. 711–718. Available: http://aspe.hhs.gov/admnsimp/final/pvcpre03.htm
[13] S. P. Ahuja, S. Mani, and J. Zambrano1, “A survey of the state of cloud [39] D. Mashima and M. Ahamad, “Enhancing accountability of electronic
computing in healthcare,” Netw. Commun. Technol., vol. 1, no. 2, pp. 12– health record usage via patient-centric monitoring,” in Proc. 2nd ACM
19, Sep. 2012. SIGHIT Sympo. Int. Health Informat., Jan. 2012, pp. 409–418.
[14] P. Mell and T. Grance. (2011). “The NIST definition of cloud computing,” [40] S. Haas, S. Wohlgemuth, I. Echizen, N. Sonehara, and G. Müller, “Aspects
NIST Specialpublication. [Online]. Available: http://predeveloper.att. of privacy for electronic health records,” Int. J. Med. Informat., vol. 80,
com/home/learn/enablingtechnologies/The_NIST_Definition_of_Cloud_ no. 2, pp. e26–e31, 2011.
Computing.pdf [41] A. Pfitzmann and M. Hansen. (2013, Sep. 28). “Anonymity, unlink-
[15] B. Grobauer, T. Walloschek, and E. Stocker, “Understanding cloud com- ability, unobservability, pseudonymity, and identity management—A
puting vulnerabilities,” IEEE Security Privacy, vol. 9, no. 2, pp. 50–57, consolidated proposal for terminology,” [Online]. Available: http://
Mar. 2011. citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.154.421&rep=rep1
[16] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and &type=pdf
J. Molina, “Controlling data in the cloud: outsourcing computation without [42] M. Jafari, R. S. Naini, and N. P. Sheppard, “A rights management approach
outsourcing control,” in Proc. ACM Workshop on Cloud Comput. Security, to protection of privacy in a cloud of electronic health records,” in Proc.
Nov. 2009, pp. 85–90. 11th Annu. ACM Workshop Digital Rights Manag., Oct. 2011, pp. 23–30.
[17] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable and fine- [43] L. Hans, A. R. Sadeghi, and M. Winandy, “Securing the e-Health
grained data access control in cloud computing,” in Proc. IEEE Infocom, cloud,” in Proc. 1st ACM Int. Health Informat. Sympo., Nov. 2010, pp.
Mar. 2010, pp. 1–9. 220–229.
[18] B. Horowitz. (2012, Dec. 20). “Cloud comput. brings chal- [44] J. Pecarina, S. Pu, and J.-C. Liu, “SAPPHIRE: Anonymity for enhanced
lenges for health care data storage, privacy,” [Online]. Available: control and private collaboration in healthcare clouds,” in Proc. IEEE 4th
http://www.eweek.com/c/a/Health-Care-IT Int. Conf. Cloud Comput. Technol. Sci., 2012, pp. 99–106.
[19] J. Vilaplana, F. Solsona, F. Abella, R. Filgueira, and J. Rius, “The cloud [45] H. Thomas, H. Löhr, A. R. Sadeghi, and M. Winandy, “Flexible patient-
paradigm applied to e-Health,” BMC Med. Inf. Decision Making, vol. 35, controlled security for electronic health records,” in Proc. 2nd ACM
no. 13, pp. 1–10, 2013. SIGHT Sympo. Int. Health Informatics, Jan. 2012, pp. 727–732.
[20] E. AbuKhousa, N. Mohamed, and J. Al-Jaroodi, “E-health cloud: Oppor- [46] S. Narayan, M. Gagn´e, and R. Safavi-Naini, “Privacy preserving EHR
tunities and challenges,” Future Internet, vol. 4, no. 3, pp. 621–645, Jul. system using attribute-based infrastructure,” in Proc. ACM Cloud Comput.
2012. Security Workshop), Oct. 2010, pp. 47–52.
[21] A. Kaletsch and A. Sunyaev, “Privacy engineering: Personal health records [47] M. Barua, X. Liang, R. Lu, and X. Shen, “ESPAC: Enabling security
in cloud computing environments,” in Proc. 32nd Int. Conf. Inf. Syst., Dec. and patient-centric access control for e-health in cloud computing,” Int. J.
2011, pp. 1–11. Security Netw., vol. 6, no. 2, pp. 67–76, 2011.
[22] Y. Y. Chen, J. C. Lu, and J. K. Jan, “A secure EHR system based on hybrid [48] S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy preserving access control
clouds,” J. Med. Syst., vol. 36, no. 5, pp. 3375–3384, 2012. with authentication for securing data in clouds,” in Proc. 12th IEEE /ACM
[23] G. Ahn, H. Hu, J. Lee, and Y. Meng, “Representing and reasoning about Int. Sympo. Cluster, Cloud Grid Comput., 2012, pp. 556–563.
web access control policies,” in Proc. 34thIEEE Annu. Conf. Comput. [49] M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records
Softw. Appl.), Jul. 2010, pp. 137–146. in cloud computing: Patient-centric and fine-grained data access control
[24] H. Takabi, J. Joshi, and G. Ahn, “Security and privacy challenges in cloud in multi-owner settings,” Security Privacy in Commun. Netw., vol. 50,
computing environments,” IEEE Security Privacy, vol. 8, no. 6, pp. 24–31, pp. 89–106, Sep. 2010.
2010. [50] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing
[25] R. Wu, G. J. Ahn, H. Hu, and M. Singhal, “Information flow control in of personal health records in cloud computing using attribute-based en-
cloud computing,” in Proc. 6th Int. Conf. Collaborative Comput.: Netw., cryption,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131–143,
Appl. Work-sharing, Oct. 2010, pp. 1–7. Jan. 2013.
[26] R. Wu, G. Ahn, and H. Hu. (2013, Dec. 14) “Secure shar- [51] A. Suhair, S. Radziszowski, and R. K. Raj. (2012, Dec. 20). “Designing
ing of electronic health records in clouds,” [Online]. Available: a secure cloud-based EHR system using ciphertext-policy attribute-
http://www.public.asu.edu/∼hongxinh/papers/TrustCol12.pdf based encryption,” [Online]. Available: http://www.cs.rit.edu/
[27] N. Gonzalez, C. Miers, F. Redı́golo, T. Carvalho, M. Simplicio, ∼spr/PUBL/ehr11.pdf
M. Naslund, and M. Pourzandi, “A quantitative analysis of current se- [52] J. A. Akinyele, C. U. Lehmann, M. D. Green, M. W. Pagano, Z. N. J. Pe-
curity concerns and solutions for cloud computing,” in Proc. 3rd IEEE terson, and A. D. Rubin, “Self-protecting electronic medical records using
Int. Conf. Cloud Comput. Technol. Sci., Nov. 2011, pp. 231–238. attribute-based encryption,” Cryptology e-Print Archive, Rep. 2010/565,
[28] M. Johnson, “Data hemorrhages in the health-care sector,” Financial Cryp- 2010.
tography Data Security, vol. 5628, pp. 71–89, Apr. 2009. [53] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword search
[29] M. Kallahalla, E. Riedel, R. waminathan, Q. Wang, and K. Fu, “Plutus: over encrypted data in cloud computing,” in Proc. 31st Int. Conf. Distrib.
Scalable secure file sharing on untrusted storage,” Fast, vol. 3, pp. 29–42, Comput. Syst., Jun. 2011, pp. 383–392.
2003. [54] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled
[30] S. Kamara and K. Lauter, “Cryptographic cloud storage,” Financial Cryp- encryption: Ensuring privacy of electronic medical records,” in Proc. ACM
tography Data Security, vol. 6054, pp. 136–149, 2010. Workshop Cloud Comput. Security, Nov. 2009, pp. 103–114.
[31] Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,” IEEE [55] C. Leng, H. Yu, J. Wang, and J. Huang, “Securing personal health records
Commun. Surveys Tutorials, vol. 15, no. 2, pp. 1–17, Jul. 2012. in the cloud by enforcing sticky policies,” Telkomnika Indonesian J. Elect.
[32] J. Li, “Electronic personal health records and the question of privacy,” Eng., vol. 11, no. 4, pp. 2200–2208, 2013.
Computers, 2013, DOI: 10.1109/MC.2013.225. [56] H. Lin, J. Shao, C. Zhang, and Y. Fang, “CAM: Cloud-assisted privacy
[33] A. Rosenthal, P. Mork, M. H. Li, J. Stanford, D. Koester, and P. Reynolds, preserving mobile health monitoring,” IEEE Trans. Inf. Forensics Security,
“Cloud computing: A new business paradigm for biomedical informa- vol. 8, no. 6, pp. 985–997, Jun. 2013.

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on December 07,2020 at 11:46:19 UTC from IEEE Xplore. Restrictions apply.
ABBAS AND KHAN: REVIEW ON THE STATE-OF-THE-ART PRIVACY-PRESERVING APPROACHES IN THE e-HEALTH CLOUDS 1441

[57] M. Barni, P. Failla, R. Lazzeretti, A-R. Sadeghi, and T. Schneider, [82] G. Hsieh and R. J. Chen, “Design for a secure interoperable cloud-based
“Privacy-preserving ECG classification with branching programs and neu- personal health record service,” in Proc. 4th IEEE Int. Conf. Cloud Com-
ral networks,” IEEE Trans. Inform. Forensics Security, vol. 6, no. 2, put. Technol. Sci., 2012, pp. 472–479.
pp. 452–468, Jun. 2011. [83] D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches
[58] K. Lauter, M. Naehrig, and V. Vaikuntanathan, “Can homomorphic en- on encrypted data,” in Proc. IEEE Sympo. Security Privacy, 2000, pp. 44–
cryption be practical?” in Proc. 3rd ACM Workshop Cloud Comput. Secu- 55.
rity Workshop, 2011, pp. 113–124. [84] J. Katz, A. Sahai, and B. Waters, “Predicate encryption supporting
[59] Z. R. Li, E. C. Chang, K. H. Huang, and F. Lai, “A secure electronic disjunctions, polynomial equations, and inner products,” in Proc. Adv.
medical record sharing mechanism in the cloud computing platform,” in Cryptology—Eurocrypt, 2008, vol. 26, pp. 146–162.
Proc. 15th IEEE Int. Sympo. Consum. Electron., Jun. 2011, pp. 98–103. [85] E. Shi and B. Waters, “Delegating capabilities in predicate encryp-
[60] T. S. Chen, C. H. Liu, T. L. Chen, C. S. Chen, J. G. Bau, and T.C. Lin, tion systems,” in Automata, Languages and Programming. Heidelberg,
“Secure dynamic access control scheme of PHR in cloud computing,” J. Germany: Springer, 2008, pp. 560–578.
Med. Syst., vol. 36, no. 6, pp. 4005–4020, 2012. [86] A. Shamir, “Identity-based cryptosystems and signature schemes,” in
[61] R. Zhang, L. Liu, and R. Xue, “Role-based and time-bound access Proc. CRYPTO, 1985, pp. 47–53.
and management of EHR data,” Security Commun. Netw., 2013, DOI: [87] D. Boneh and M. K. Franklin, “Identity-based encryption from the weil
10.1002/sec. pairing,” in Proc. CRYPTO, 2001, pp. 213–229.
[62] D. W. Chadwick and K. Fatema, “A privacy preserving authorization sys- [88] C. Gentry and A. Silverberg, “Hierarchical ID-based cryptography,” in
tem for the cloud,” J. Comput. Syst. Sci., vol. 78, pp. 1359–1373, Dec. Proc. Adv. cryptology, 2002, pp. 548–566.
2011. [89] M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic
[63] P. V. Gorp and M. Comuzzi, “Lifelong personal health data and application proxy cryptography,” in Proc. Advances in Cryptology, 1998, pp. 127–
software via virtual machines in the cloud,” IEEE J. Biomed. Health 144.
Informatics, vol. 18, no. 1, pp. 1–10, Jan. 2012. [90] C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proc.
[64] E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stern, “RSA-OAEP is ACM Sympo. Theory Comput., 2009, pp. 169–178.
secure under the RSA assumption,” in Proc. CRYPTO, 2001, pp. 260–274. [91] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-
[65] A. Liu and P. Ning, “TinyECC: A configurable library for elliptic curve encryption schemes with applications to secure distributed storage,” ACM
cryptography in wireless sensor networks,” in Proc. IEEE Int. Conf. Inf. Trans. Inform. Syst. Security, vol. 9, no. 1, pp. 1–30, 2006.
Process. Sensor Netw., 2008, pp. 245–256. [92] M. Green, S. Hohenberger, and B. Waters, “Outsourcing the decryption
[66] G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, “A practical and of ABE ciphertexts,” in Proc. Usenix Security, San Francisco, CA, USA,
provably secure coalition-resistant group signature scheme,” in Proc. Adv. Aug. 8–12, 2011, pp. 34–49.
Cryptology, 2000, pp. 255–270. [93] R. Lu, X. Lin, X. Liang, and X. S. Shen, “Secure provenance: the essential
[67] A. V. Loenen “User based content key encryption for a DRM system,” of bread and butter of data forensics in cloud computing,” in Proc. 5th
WIPO Patent WO/2006/038204, Apr. 13, 2006. ACM Sympo. Inf., Comput. Commun. Security, 2010, pp. 282–292.
[68] R. Steinfeld, L. Bull, H. Wang, and J. Pieprzyk, “Universal designated-
verifier signatures,” in Advances in Cryptology-Asiacrypt. Heidelberg,
Germany: Springer, 2003, pp. 523–542.
[69] J. L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. Van Doorn, and R. Cáceres,
“Trusted virtual domains: Toward secure distributed services,” in Proc.
1st IEEE Workshop Hot Topics in Syst. Dependability, 2005, pp. 1–6.
[70] M. Agrawal and P. Mishra, “A comparative survey on symmetric key
encryption techniques,” Int. J. Comput. Sci. Eng., vol. 4, pp. 877–882,
2012. Assad Abbas completed Master of Science in Infor-
[71] E. Bertino, N. Shang, and S. S. Wagstaff, “An efficient time-bound hier- matics from University of Skovde, Sweden in 2010.
archical key management scheme for secure broadcasting,” IEEE Trans. Currently, he is pursuing PhD at Department of Elec-
Dependable Secure Comput., vol. 5, no. 2, pp. 65–70, Apr.–Jun. 2008. trical and Computer Engineering, North Dakota State
[72] A. Sahai and B. Waters, “Fuzzy identity based encryption,” Adv. Cryptol. University, USA. He is affiliated with COMSATS
Eurocrypt, vol. 3494, pp. 457–473, May 2005. Institute of Information Technology, Pakistan since
[73] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption 2004. His research interests are mainly but not limited
for fine-grained access control of encrypted data,” in Proc. 13th ACM Conf. to Cloud Computing, Information Systems, Knowl-
Comput. Commun. Security, Oct. 2006, pp. 89–98. edge Based Medical Decision Support Systems, and
[74] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based Data Mining.
encryption,” in Proc. IEEE Sympo. Security Privacy, 2007, pp. 321–334.
[75] Z. Zhou and D. Huang, “On efficient ciphertext-policy attribute based
encryption and broadcast encryption,” in Proc. 17th ACM Conf. Comput.
Commun. Security, 2010, pp. 753–755.
[76] M. Chase and S. S. Chow, “Improving privacy and security in multi-
authority attribute-based encryption,” in Proc. 16th ACM Conf. Comput.
Comm. Security, 2009, pp. 121–130.
[77] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key
encryption with keyword search,” in Proc. Adv. Cryptology-Eurocrypt,
2004, pp. 506–522. Samee U. Khan (SM’12) received a BS degree from
[78] M. Irfan and S. Yasin, “A novel framework for securing medical records Ghulam Ishaq Khan Institute of Engineering Sci-
in cloud computing,” Int. J. Modern Eng. Res., vol. 3, pp. 2697–2699, ences and Technology, Topi, Pakistan, and a PhD
2013. from the University of Texas, Arlington, TX, USA.
[79] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with Currently, he is Assistant Professor of Electrical and
attribute revocation,” in Proc. 5th ACM Sympo. Inf., Comput. Commun. Computer Engineering at the North Dakota State Uni-
Security, 2010, pp. 261–270. versity, Fargo, ND, USA. Prof. Khan’s research in-
[80] L. Ibraimi, M. Asim, and M. Petkovic, “Secure management of per- terests include optimization, robustness, and security
sonal health records by applying attribute-based encryption,” University of: cloud, grid, cluster and big data computing, so-
of Twente, Enschede, The Netherlands Tech. Rep., TR-CTIT-09-41, 2009. cial networks, wired and wireless networks, power
[81] C. Wang, X. Liu, and W. Li, “Design and implementation of a se- systems, smart grids, and optical networks. His work
cure cloud–based personal health record system using ciphertext—policy has appeared in over 225 publications. He is a Fellow of the Institution of
attribute—based encryption,” Int. J. Intell. Inf. Database Syst., vol. 7, Engineering and Technology (IET, formerly IEE), and a Fellow of the British
no. 5, pp. 389–399, 2013. Computer Society (BCS).

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on December 07,2020 at 11:46:19 UTC from IEEE Xplore. Restrictions apply.

You might also like