2016
DOI: 10.1002/sec.1556
|View full text |Cite
|
Sign up to set email alerts
|

Consent-based access control for secure and privacy-preserving health information exchange

Abstract: Electronic health record exchanges are crucial functions of modern healthcare systems. These components are fundamental in providing quality care and enable for a larger spectrum of services. A framework which protects patient information during data exchanges is essential for healthcare systems. To achieve security and privacy‐preservation for information exchange, we propose a consent‐based access control (CBAC) mechanism for healthcare systems. A consent is an authorization initiated by a patient for an int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 38 publications
0
15
0
Order By: Relevance
“…Thus, the security and protection of PHR have been of great concern and a subject of research over the years [13]. Zhang et al [14] proposed a PHR security and privacy preservation scheme by introducing consent-based access control, where the consent can only be generated by an authorized user based on PRE. Currently, there has been an increasing interest in applying ABE to protect PHR.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the security and protection of PHR have been of great concern and a subject of research over the years [13]. Zhang et al [14] proposed a PHR security and privacy preservation scheme by introducing consent-based access control, where the consent can only be generated by an authorized user based on PRE. Currently, there has been an increasing interest in applying ABE to protect PHR.…”
Section: Related Workmentioning
confidence: 99%
“…Zhang et al [14], Wang et al [25], Au et al [20], and our scheme support data authorization by deploying PRE mechanism so that the semitrusted server could reencrypt the ciphertext to data requester for research and analysis purposes without acquiring any plaintext. Further, PEC [26] combines social data with healthcare record for emergency call, and EPPS [27] divides the mobile patients into different groups according to social data.…”
Section: Functionality Comparisonsmentioning
confidence: 99%
“…For the sake of improving the efficiency in cloud‐based secure data sharing, many works focus on achieving flexible and lightweight access control 7–12 . Most of the works adopt attribute‐based encryption (ABE) algorithms or other public key encryption primitives to achieve fine‐grained access control with flexibility.…”
Section: Introductionmentioning
confidence: 99%
“…Bob requests a re-encryption key to facilitate decryption of Alice’s ciphertext without exposing either party’s secret information. PRE has been generally deployed in the cloud [63-70] for network storage [60], distributed file systems [71], email forwarding [65,71], and information exchange [72]. In health care, it has been suggested to safeguard patient data and identities in cloud-based systems [73,74], secure mobile health monitoring and telehealth [66-68,75], and control disclosure of information in PHRs [65] and health information exchanges [72].…”
Section: Introductionmentioning
confidence: 99%