Skip to main content

Privacy and Trust Models for Cloud-Based EHRs Using Multilevel Cryptography and Artificial Intelligence

  • Chapter
  • First Online:
Artificial Intelligence for Cloud and Edge Computing

Abstract

The pervasive as well as service-oriented nature of cloud computing has necessitated its adoption for development, deployment and servicing of Health Records Management solutions in today’s modern world. However, there are rapidly growing concerns for security/privacy and trustworthiness of such cloud-based systems/services. The dynamics of electronic health records (EHR) management system makes privacy preservation and trust, non-negotiable features of a presumably reliable cloud service. To cater for these concerns, this chapter proposes a multilevel cryptography approach for achieving security (privacy) in electronic health system. This approach involves using AES algorithm for on-premise encryption service and ECC for cloud-based encryption services towards ensuring data security/privacy at both the local hospitals’ electronic medical record (EMR) systems and the central cloud electronic health record (EHR) ends. Also, an artificial intelligence (AI) approach, which is referred to as subjective logic-based belief or reasoning model, was used towards measuring the trustworthiness of the medical personnel. Metrics such as the average system computation time otherwise referred to as the encryption/decryption runtime, system throughput, and system output size were utilized for appraising the privacy model in the newly developed system. The system was also compared with existing related systems in terms of standard reputation measurement metrics in order to determine its reputation performance. Results obtained from implementation shows that the proposed system offer better or highly improved performance in terms of security/privacy for users’ data, as well as reputation measurements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Buyya R, Ramamohanarao K, Leckie C, Calheiros RN, Dastjerdi AV, Versteeg S (2015) Big Data Analytics-Enhanced Cloud Computing: Challenges, Architectural Elements, and Future Directions. 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS), pp. 75–84. https://doi.org/10.1109/ICPADS.2015.18

  2. Mell P, Grance T (2010) The NIST definition of cloud computing. National Institute of Standards and Technology. http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.Doc

  3. Thampi SM, Bhargava B, Atrey PK (2013) Managing trust in cyberspace. CRC Press, Taylor and Francis Group, Boston

    Book  Google Scholar 

  4. Sultan N (2010) Cloud computing for education: a new dawn. Int J Inf Manag 30:109–116

    Article  Google Scholar 

  5. Ajayi P, Omoregbe N, Adeloye D, Misra S (2016) Development of a secured cloud based health information system for antenatal and postnatal clinic in an African Country. In: Advances in digital technologies, Frontiers in artificial intelligence and applications, vol 282, pp 197–210

    Google Scholar 

  6. Josang A (2016) Subjective logic: a formalism for reasoning under uncertainty. Springer International Publishing, Cham. https://doi.org/10.1007/978-3-319-42337-1

    Book  MATH  Google Scholar 

  7. Grandison T, Sloman M (2001) A survey of trust in internet applications. IEEE Commun Surv Tutor, Fourth Quarter 2000. http://www.comsoc.org/pubs/surveys

  8. Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu HH (2013) Cloud armor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27(2):367–380., 1 Feb. 2016. https://doi.org/10.1109/TPDS.2015.2408613

    Article  Google Scholar 

  9. Alabi O, Thompson AF, Alese BK, Gabriel AJ (2020) Cloud application security using hybrid encryption. Commun Appl Electron 7(33):25–31

    Article  Google Scholar 

  10. Olmedilla D, Rana O, Matthews B, Nejdl W (2005) Security and trust issues in semantic grids. In: Proceedings of the Dagsthul seminar, semantic grid: the convergence of technologies, 05271

    Google Scholar 

  11. Alhaqbani B, Fidge C (2009) A time-variant medical data trustworthiness assessment model. In: Hoang D, Foureur M (eds) Proceedings ofthe 11th international conference on e-health networking, applications and services (HealthCom 2009), 16–18 December, Sydney. IEEE, December 2009. To appear. https://doi.org/10.1109/HEALTH.2009.5406198

  12. Gabriel AJ, Adetunmbi AO, Obaila P (2020) A two-layer image-steganography system for covert communication over enterprise network. In: Gervasi O et al (eds) Computational science and its applications – ICCSA 2020, Lecture notes in computer science, vol 12254. Springer Nature, Cham, pp 459–470. https://doi.org/10.1007/978-3-030-58817-5_34

    Chapter  Google Scholar 

  13. Alhaqbani B (2010) Privacy and trust management for electronic health records. Queensland University of Technology, Brisbane

    Google Scholar 

  14. Akinyele J, Pagano M, Green M, Rubin A, Lehmann C, Peterson Z (2011) Securing electronic medical records using attribute-based encryption on mobile devices. In: SPSM ’11: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile device, October 2011, pp 75–86. https://doi.org/10.1145/2046614.2046628

  15. Tsai K, Leu F, Tien-Han W, Chiou S, Liu Y, Liu H (2014) Secure ECC based electronic medical record system. J Internet Serv Inf Secur (JISIS) 4(1):47–57

    Google Scholar 

  16. Ayeni F, Misra S (2014) Overcoming barriers of effective health care delivery and electronic health records in Nigeria using socialized medicine. In: Proceedings of 11th international conference on electronice, computer and computation, 2014. IEEE CPS Publication, pp 1–4. https://doi.org/10.1109/ICECCO.2014.6997568

  17. Ajala F, Awokola J, Emuoyibofarhe O (2015) Development of an electronic medical record (EMR) system for a typical Nigerian hospital. J Multidiscip Eng Sci Technol (JMEST) 2(6). ISSN: 3159-0040

    Google Scholar 

  18. Boyinbode O, Toriola G (2015) CloudeMR: a cloud based electronic medical record system. Int J Hybrid Inf Technol 8(4):201–212

    Google Scholar 

  19. Joshi M, Joshi KP, Finin T (2018) Attribute based encryption for secure access to cloud based EHR systems. In: Proceedings of the IEEE CLOUD conference, 2018, San Francisco

    Google Scholar 

  20. Premarathne U, Abuadbba A, Alabdulatif A, Khalil I, Tari Z, Zomaya A, Buyya R (2015) Hybrid cryptographic access control for cloud-based EHR systems. IEEE Cloud Comput 3(4):58–64. https://doi.org/10.1109/mcc.2016.76

    Article  Google Scholar 

  21. Deshmukh P (2017) Design of cloud security in the EHR for Indian healthcare services. J King Saud Univ Comput Inf Sci 29(3):281–287., ISSN 1319-1578. https://doi.org/10.1016/j.jksuci.2016.01.002

    Article  Google Scholar 

  22. Seol K, Kim Y-G, Lee E, Seo Y-D, Baik DK (2018) Privacy-preserving attribute-based access control model for XML-based electronic health record system. IEEE Access 6:9114–9128. https://doi.org/10.1109/access.2018.2800288

    Article  Google Scholar 

  23. Behrooz S, Marsh S (2016) A trust-based framework for information sharing between mobile health care applications. In: 10th IFIP international conference on trust management (TM), Jul 2016, Darmstadt, Germany, pp 79–95. https://doi.org/10.1007/978-3-319-41354-9_6. hal-01438350

  24. Rana ME, Kubbo M, Jayabalan M (2017) Privacy and security challenges towards cloud based access control in electronic health records. Asian J Inf Technol 2(5):274–281

    Google Scholar 

  25. Ghorbel A, Ghorbel M, Jmaiel M (2017) Privacy in cloud computing environments: a survey and research challenges. J Supercomput 73:2763–2800. https://doi.org/10.1007/s11227-016-1953-y

    Article  Google Scholar 

  26. Afshar M, Samet S, Hu T (2018) An attribute based access control framework for healthcare system. IOP Conf Ser J Phys 933:012020. https://doi.org/10.1088/1742-6596/933/1/012020

    Article  Google Scholar 

  27. Rajasekaran P, Mohanasundaram R, Kumar AP (2018) Design of EHR in cloud with security. In: Proceedings of the second international conference on SCI 2018, vol 2. https://doi.org/10.1007/978-981-13-1927-3_45

  28. Orehovački T, Babić S, Etinger D (2018) Identifying relevance of security, privacy, trust, and adoption dimensions concerning cloud computing applications employed in educational settings. In: Nicholson D (ed) Advances in human factors in cybersecurity. AHFE 2017, Advances in intelligent systems and computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_29

    Chapter  Google Scholar 

  29. Horn C, Tropmann-Frick M (2018) Privacy issues for cloud systems. In: Elloumi M et al (eds) Database and expert systems applications. DEXA 2018, Communications in computer and information science, vol 903. Springer, Cham. https://doi.org/10.1007/978-3-319-99133-7_3

    Chapter  Google Scholar 

  30. Kavitha M, Venkata Krishna P (2020) IoT-cloud-based health care system framework to detect breast abnormality. In: Venkata Krishna P, Obaidat M (eds) Emerging research in data engineering systems and computer communications, Advances in intelligent systems and computing, vol 1054. Springer, Singapore. https://doi.org/10.1007/978-981-15-0135-7_56

    Chapter  Google Scholar 

  31. Georgiou D, Lambrinoudakis C (2020) Cloud computing framework for e-health security requirements and security policy rules case study: a European cloud-based health system. In: Gritzalis S, Weippl ER, Kotsis G, Tjoa AM, Khalil I (eds) Trust, privacy and security in digital business. TrustBus 2020, Lecture notes in computer science, vol 12395. Springer, Cham. https://doi.org/10.1007/978-3-030-58986-8_2

    Chapter  Google Scholar 

  32. Alofe OM, Fatema K (2021) Trustworthy cloud computing. In: Lynn T, Mooney JG, van der Werff L, Fox G (eds) Data privacy and trust in cloud computing, Palgrave studies in digital business & enabling technologies. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-54660-1_7

    Chapter  Google Scholar 

  33. Lynn T (2021) Dear cloud, I think we have trust issues: cloud computing contracts and trust. In: Lynn T, Mooney JG, van der Werff L, Fox G (eds) Data privacy and trust in cloud computing, Palgrave studies in digital business & enabling technologies. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-54660-1_2

    Chapter  Google Scholar 

  34. Fox G (2021) Understanding and enhancing consumer privacy perceptions in the cloud. In: Lynn T, Mooney JG, van der Werff L, Fox G (eds) Data privacy and trust in cloud computing, Palgrave studies in digital business & enabling technologies. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-54660-1_4

    Chapter  Google Scholar 

  35. Priyadarshini P, Prashant N, Narayan DG, Meena SM (2016) A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish. Proc Comput Sci 78(1):617–624

    Google Scholar 

  36. Corradini F, De Angelis F, Ippoliti F et al (2015) A survey of trust management models for cloud computing, University of Camerino, Via del Bastione 1, 62032, Camerino, Italy

    Google Scholar 

  37. McKnight D, Choudhury V, Kacmar C (2002) The impact of initial consumer trust on intentions to transact with a web site: a trust building model. J Strateg Inf Syst 11:297–323

    Article  Google Scholar 

  38. Guo J, Chen I A classification of trust computation models for service-oriented internet of things systems. https://ieeexplore.ieee.org/xpl/conhome/7194374/proceedings

  39. Boukerche A, Ren Y (2008) A trust-based security system for ubiquitous and pervasive computing environments. Comput Commun 31(18):4343–4351. https://doi.org/10.1016/j.comcom.2008.05.007

    Article  Google Scholar 

  40. Saghar B, Stephen M (2016) A trust-based framework for information sharing between mobile health care applications. In: 10th IFIP international conference on trust management (TM), Jul 2016, Darmstadt, Germany, pp 79–95. https://doi.org/10.1007/978-3-319-41354-9_6.hal-01438350

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arome Junior Gabriel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alabi, O., Gabriel, A.J., Thompson, A., Alese, B.K. (2022). Privacy and Trust Models for Cloud-Based EHRs Using Multilevel Cryptography and Artificial Intelligence. In: Misra, S., Kumar Tyagi, A., Piuri, V., Garg, L. (eds) Artificial Intelligence for Cloud and Edge Computing. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-80821-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-80821-1_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-80820-4

  • Online ISBN: 978-3-030-80821-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics