A4: An Authentication, Authorization and Access Control Scheme for Electronic Health Records using Attribute-based Encryption Algorithm

碩士 === 國立交通大學 === 電機工程學系 === 104 === As the rapid development of cloud computing technologies, health records are stored in a cloud system for information sharing and ease access. The electronic health record system running on a cloud needs to preserve the confidentiality and integrity of the health...

Full description

Bibliographic Details
Main Authors: Shih, Wei-Yao, 施惟堯
Other Authors: Huang, Yu-Lun
Format: Others
Language:en_US
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/9222vz
id ndltd-TW-104NCTU5442024
record_format oai_dc
spelling ndltd-TW-104NCTU54420242019-05-15T23:08:41Z http://ndltd.ncl.edu.tw/handle/9222vz A4: An Authentication, Authorization and Access Control Scheme for Electronic Health Records using Attribute-based Encryption Algorithm A4: 基於屬性加密演算法之電子病歷系統的身分認證、授權與存取控制機制 Shih, Wei-Yao 施惟堯 碩士 國立交通大學 電機工程學系 104 As the rapid development of cloud computing technologies, health records are stored in a cloud system for information sharing and ease access. The electronic health record system running on a cloud needs to preserve the confidentiality and integrity of the health records. Nevertheless, in the current design, a patient can only share his/her health records with a doctor in a single hospital. Therefore, the doctor who needs to refer to the patient's health records in other hospitals may fail to access the records crossing hospitals, and similar examinations need to be reconducted. In this thesis, we propose an Auth, Auz and Access control scheme using Attribute-based encryption (called A4) to secure the confidentiality of the electronic health records transmitted over the Internet. A4 leverages ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) algorithm to encrypt and decrypt the health records stored in the cloud. A4 is composed of seven phases including "Init", "Reg", "Appoint", "EHRReqI", "EHRReqII", "Condult" and "Diagnosis" phases. The seven phases is to fulfill the health record requests in different scenarios. A4 allows a doctor to access the medical data crossing the hospitals when the doctor has to refer to a patient's health records in a different hospital for better diagnosis. $A^4$ also provides the functionality that allows a doctor to consult with other doctors specializing in different ontologies. By using BAN logic, we demonstrate the $A^4$ is secure enough to fulfill the fundamental security requirements, such as parties authentication and message freshness, etc. We also prove that $A_4$ can resist common attacks, including Replay Attack, Man-in-the-middle Attack, Eavesdropping Attack and DDOS Attack. Huang, Yu-Lun 黃育綸 2016 學位論文 ; thesis 74 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 電機工程學系 === 104 === As the rapid development of cloud computing technologies, health records are stored in a cloud system for information sharing and ease access. The electronic health record system running on a cloud needs to preserve the confidentiality and integrity of the health records. Nevertheless, in the current design, a patient can only share his/her health records with a doctor in a single hospital. Therefore, the doctor who needs to refer to the patient's health records in other hospitals may fail to access the records crossing hospitals, and similar examinations need to be reconducted. In this thesis, we propose an Auth, Auz and Access control scheme using Attribute-based encryption (called A4) to secure the confidentiality of the electronic health records transmitted over the Internet. A4 leverages ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) algorithm to encrypt and decrypt the health records stored in the cloud. A4 is composed of seven phases including "Init", "Reg", "Appoint", "EHRReqI", "EHRReqII", "Condult" and "Diagnosis" phases. The seven phases is to fulfill the health record requests in different scenarios. A4 allows a doctor to access the medical data crossing the hospitals when the doctor has to refer to a patient's health records in a different hospital for better diagnosis. $A^4$ also provides the functionality that allows a doctor to consult with other doctors specializing in different ontologies. By using BAN logic, we demonstrate the $A^4$ is secure enough to fulfill the fundamental security requirements, such as parties authentication and message freshness, etc. We also prove that $A_4$ can resist common attacks, including Replay Attack, Man-in-the-middle Attack, Eavesdropping Attack and DDOS Attack.
author2 Huang, Yu-Lun
author_facet Huang, Yu-Lun
Shih, Wei-Yao
施惟堯
author Shih, Wei-Yao
施惟堯
spellingShingle Shih, Wei-Yao
施惟堯
A4: An Authentication, Authorization and Access Control Scheme for Electronic Health Records using Attribute-based Encryption Algorithm
author_sort Shih, Wei-Yao
title A4: An Authentication, Authorization and Access Control Scheme for Electronic Health Records using Attribute-based Encryption Algorithm
title_short A4: An Authentication, Authorization and Access Control Scheme for Electronic Health Records using Attribute-based Encryption Algorithm
title_full A4: An Authentication, Authorization and Access Control Scheme for Electronic Health Records using Attribute-based Encryption Algorithm
title_fullStr A4: An Authentication, Authorization and Access Control Scheme for Electronic Health Records using Attribute-based Encryption Algorithm
title_full_unstemmed A4: An Authentication, Authorization and Access Control Scheme for Electronic Health Records using Attribute-based Encryption Algorithm
title_sort a4: an authentication, authorization and access control scheme for electronic health records using attribute-based encryption algorithm
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/9222vz
work_keys_str_mv AT shihweiyao a4anauthenticationauthorizationandaccesscontrolschemeforelectronichealthrecordsusingattributebasedencryptionalgorithm
AT shīwéiyáo a4anauthenticationauthorizationandaccesscontrolschemeforelectronichealthrecordsusingattributebasedencryptionalgorithm
AT shihweiyao a4jīyúshǔxìngjiāmìyǎnsuànfǎzhīdiànzibìnglìxìtǒngdeshēnfēnrènzhèngshòuquányǔcúnqǔkòngzhìjīzhì
AT shīwéiyáo a4jīyúshǔxìngjiāmìyǎnsuànfǎzhīdiànzibìnglìxìtǒngdeshēnfēnrènzhèngshòuquányǔcúnqǔkòngzhìjīzhì
_version_ 1719140602247905280