Abstract
The pervasive as well as service-oriented nature of cloud computing has necessitated its adoption for development, deployment and servicing of Health Records Management solutions in today’s modern world. However, there are rapidly growing concerns for security/privacy and trustworthiness of such cloud-based systems/services. The dynamics of electronic health records (EHR) management system makes privacy preservation and trust, non-negotiable features of a presumably reliable cloud service. To cater for these concerns, this chapter proposes a multilevel cryptography approach for achieving security (privacy) in electronic health system. This approach involves using AES algorithm for on-premise encryption service and ECC for cloud-based encryption services towards ensuring data security/privacy at both the local hospitals’ electronic medical record (EMR) systems and the central cloud electronic health record (EHR) ends. Also, an artificial intelligence (AI) approach, which is referred to as subjective logic-based belief or reasoning model, was used towards measuring the trustworthiness of the medical personnel. Metrics such as the average system computation time otherwise referred to as the encryption/decryption runtime, system throughput, and system output size were utilized for appraising the privacy model in the newly developed system. The system was also compared with existing related systems in terms of standard reputation measurement metrics in order to determine its reputation performance. Results obtained from implementation shows that the proposed system offer better or highly improved performance in terms of security/privacy for users’ data, as well as reputation measurements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Buyya R, Ramamohanarao K, Leckie C, Calheiros RN, Dastjerdi AV, Versteeg S (2015) Big Data Analytics-Enhanced Cloud Computing: Challenges, Architectural Elements, and Future Directions. 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS), pp. 75–84. https://doi.org/10.1109/ICPADS.2015.18
Mell P, Grance T (2010) The NIST definition of cloud computing. National Institute of Standards and Technology. http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.Doc
Thampi SM, Bhargava B, Atrey PK (2013) Managing trust in cyberspace. CRC Press, Taylor and Francis Group, Boston
Sultan N (2010) Cloud computing for education: a new dawn. Int J Inf Manag 30:109–116
Ajayi P, Omoregbe N, Adeloye D, Misra S (2016) Development of a secured cloud based health information system for antenatal and postnatal clinic in an African Country. In: Advances in digital technologies, Frontiers in artificial intelligence and applications, vol 282, pp 197–210
Josang A (2016) Subjective logic: a formalism for reasoning under uncertainty. Springer International Publishing, Cham. https://doi.org/10.1007/978-3-319-42337-1
Grandison T, Sloman M (2001) A survey of trust in internet applications. IEEE Commun Surv Tutor, Fourth Quarter 2000. http://www.comsoc.org/pubs/surveys
Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu HH (2013) Cloud armor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27(2):367–380., 1 Feb. 2016. https://doi.org/10.1109/TPDS.2015.2408613
Alabi O, Thompson AF, Alese BK, Gabriel AJ (2020) Cloud application security using hybrid encryption. Commun Appl Electron 7(33):25–31
Olmedilla D, Rana O, Matthews B, Nejdl W (2005) Security and trust issues in semantic grids. In: Proceedings of the Dagsthul seminar, semantic grid: the convergence of technologies, 05271
Alhaqbani B, Fidge C (2009) A time-variant medical data trustworthiness assessment model. In: Hoang D, Foureur M (eds) Proceedings ofthe 11th international conference on e-health networking, applications and services (HealthCom 2009), 16–18 December, Sydney. IEEE, December 2009. To appear. https://doi.org/10.1109/HEALTH.2009.5406198
Gabriel AJ, Adetunmbi AO, Obaila P (2020) A two-layer image-steganography system for covert communication over enterprise network. In: Gervasi O et al (eds) Computational science and its applications – ICCSA 2020, Lecture notes in computer science, vol 12254. Springer Nature, Cham, pp 459–470. https://doi.org/10.1007/978-3-030-58817-5_34
Alhaqbani B (2010) Privacy and trust management for electronic health records. Queensland University of Technology, Brisbane
Akinyele J, Pagano M, Green M, Rubin A, Lehmann C, Peterson Z (2011) Securing electronic medical records using attribute-based encryption on mobile devices. In: SPSM ’11: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile device, October 2011, pp 75–86. https://doi.org/10.1145/2046614.2046628
Tsai K, Leu F, Tien-Han W, Chiou S, Liu Y, Liu H (2014) Secure ECC based electronic medical record system. J Internet Serv Inf Secur (JISIS) 4(1):47–57
Ayeni F, Misra S (2014) Overcoming barriers of effective health care delivery and electronic health records in Nigeria using socialized medicine. In: Proceedings of 11th international conference on electronice, computer and computation, 2014. IEEE CPS Publication, pp 1–4. https://doi.org/10.1109/ICECCO.2014.6997568
Ajala F, Awokola J, Emuoyibofarhe O (2015) Development of an electronic medical record (EMR) system for a typical Nigerian hospital. J Multidiscip Eng Sci Technol (JMEST) 2(6). ISSN: 3159-0040
Boyinbode O, Toriola G (2015) CloudeMR: a cloud based electronic medical record system. Int J Hybrid Inf Technol 8(4):201–212
Joshi M, Joshi KP, Finin T (2018) Attribute based encryption for secure access to cloud based EHR systems. In: Proceedings of the IEEE CLOUD conference, 2018, San Francisco
Premarathne U, Abuadbba A, Alabdulatif A, Khalil I, Tari Z, Zomaya A, Buyya R (2015) Hybrid cryptographic access control for cloud-based EHR systems. IEEE Cloud Comput 3(4):58–64. https://doi.org/10.1109/mcc.2016.76
Deshmukh P (2017) Design of cloud security in the EHR for Indian healthcare services. J King Saud Univ Comput Inf Sci 29(3):281–287., ISSN 1319-1578. https://doi.org/10.1016/j.jksuci.2016.01.002
Seol K, Kim Y-G, Lee E, Seo Y-D, Baik DK (2018) Privacy-preserving attribute-based access control model for XML-based electronic health record system. IEEE Access 6:9114–9128. https://doi.org/10.1109/access.2018.2800288
Behrooz S, Marsh S (2016) A trust-based framework for information sharing between mobile health care applications. In: 10th IFIP international conference on trust management (TM), Jul 2016, Darmstadt, Germany, pp 79–95. https://doi.org/10.1007/978-3-319-41354-9_6. hal-01438350
Rana ME, Kubbo M, Jayabalan M (2017) Privacy and security challenges towards cloud based access control in electronic health records. Asian J Inf Technol 2(5):274–281
Ghorbel A, Ghorbel M, Jmaiel M (2017) Privacy in cloud computing environments: a survey and research challenges. J Supercomput 73:2763–2800. https://doi.org/10.1007/s11227-016-1953-y
Afshar M, Samet S, Hu T (2018) An attribute based access control framework for healthcare system. IOP Conf Ser J Phys 933:012020. https://doi.org/10.1088/1742-6596/933/1/012020
Rajasekaran P, Mohanasundaram R, Kumar AP (2018) Design of EHR in cloud with security. In: Proceedings of the second international conference on SCI 2018, vol 2. https://doi.org/10.1007/978-981-13-1927-3_45
Orehovački T, Babić S, Etinger D (2018) Identifying relevance of security, privacy, trust, and adoption dimensions concerning cloud computing applications employed in educational settings. In: Nicholson D (ed) Advances in human factors in cybersecurity. AHFE 2017, Advances in intelligent systems and computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_29
Horn C, Tropmann-Frick M (2018) Privacy issues for cloud systems. In: Elloumi M et al (eds) Database and expert systems applications. DEXA 2018, Communications in computer and information science, vol 903. Springer, Cham. https://doi.org/10.1007/978-3-319-99133-7_3
Kavitha M, Venkata Krishna P (2020) IoT-cloud-based health care system framework to detect breast abnormality. In: Venkata Krishna P, Obaidat M (eds) Emerging research in data engineering systems and computer communications, Advances in intelligent systems and computing, vol 1054. Springer, Singapore. https://doi.org/10.1007/978-981-15-0135-7_56
Georgiou D, Lambrinoudakis C (2020) Cloud computing framework for e-health security requirements and security policy rules case study: a European cloud-based health system. In: Gritzalis S, Weippl ER, Kotsis G, Tjoa AM, Khalil I (eds) Trust, privacy and security in digital business. TrustBus 2020, Lecture notes in computer science, vol 12395. Springer, Cham. https://doi.org/10.1007/978-3-030-58986-8_2
Alofe OM, Fatema K (2021) Trustworthy cloud computing. In: Lynn T, Mooney JG, van der Werff L, Fox G (eds) Data privacy and trust in cloud computing, Palgrave studies in digital business & enabling technologies. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-54660-1_7
Lynn T (2021) Dear cloud, I think we have trust issues: cloud computing contracts and trust. In: Lynn T, Mooney JG, van der Werff L, Fox G (eds) Data privacy and trust in cloud computing, Palgrave studies in digital business & enabling technologies. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-54660-1_2
Fox G (2021) Understanding and enhancing consumer privacy perceptions in the cloud. In: Lynn T, Mooney JG, van der Werff L, Fox G (eds) Data privacy and trust in cloud computing, Palgrave studies in digital business & enabling technologies. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-54660-1_4
Priyadarshini P, Prashant N, Narayan DG, Meena SM (2016) A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish. Proc Comput Sci 78(1):617–624
Corradini F, De Angelis F, Ippoliti F et al (2015) A survey of trust management models for cloud computing, University of Camerino, Via del Bastione 1, 62032, Camerino, Italy
McKnight D, Choudhury V, Kacmar C (2002) The impact of initial consumer trust on intentions to transact with a web site: a trust building model. J Strateg Inf Syst 11:297–323
Guo J, Chen I A classification of trust computation models for service-oriented internet of things systems. https://ieeexplore.ieee.org/xpl/conhome/7194374/proceedings
Boukerche A, Ren Y (2008) A trust-based security system for ubiquitous and pervasive computing environments. Comput Commun 31(18):4343–4351. https://doi.org/10.1016/j.comcom.2008.05.007
Saghar B, Stephen M (2016) A trust-based framework for information sharing between mobile health care applications. In: 10th IFIP international conference on trust management (TM), Jul 2016, Darmstadt, Germany, pp 79–95. https://doi.org/10.1007/978-3-319-41354-9_6.hal-01438350
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Alabi, O., Gabriel, A.J., Thompson, A., Alese, B.K. (2022). Privacy and Trust Models for Cloud-Based EHRs Using Multilevel Cryptography and Artificial Intelligence. In: Misra, S., Kumar Tyagi, A., Piuri, V., Garg, L. (eds) Artificial Intelligence for Cloud and Edge Computing. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-80821-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-80821-1_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-80820-4
Online ISBN: 978-3-030-80821-1
eBook Packages: Computer ScienceComputer Science (R0)