Skip to main content

Advertisement

Log in

Privacy Preserving Index for Encrypted Electronic Medical Records

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

With the development of electronic systems, privacy has become an important security issue in real-life. In medical systems, privacy of patients’ electronic medical records (EMRs) must be fully protected. However, to combine the efficiency and privacy, privacy preserving index is introduced to preserve the privacy, where the EMR can be efficiently accessed by this patient or specific doctor. In the literature, Goh first proposed a secure index scheme with keyword search over encrypted data based on a well-known primitive, Bloom filter. In this paper, we propose a new privacy preserving index scheme, called position index (P-index), with keyword search over the encrypted data. The proposed index scheme is semantically secure against the adaptive chosen keyword attack, and it also provides flexible space, lower false positive rate, and search privacy. Moreover, it does not rely on pairing, a complicate computation, and thus can search over encrypted electronic medical records from the cloud server efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. E is outside the scope of discussing keyword-searchable encryption. It is assumed to be a secure encryption algorithm. For more details, we can refer to [12, 18].

References

  1. Fan, C. I., Huang, S. Y., Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Futur. Gener. Comput. Syst. 2012 (in Press). doi:10.1016/j.future.2012.05.005.

  2. Kaufman, L. M., Data security in the world of cloud computing. IEEE Secur. Priv. 7:61–64, 2009.

    Google Scholar 

  3. Subashini, S., Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34:1–11, 2011.

    Google Scholar 

  4. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J., Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22:847–859, 2011.

    Article  Google Scholar 

  5. Byun, J., and Lee, D., On a security model of conjunctive keyword search over encrypted relational database. J. Syst. Softw. 84:1364–1372, 2011.

    Article  Google Scholar 

  6. Byun, J., Lee, D., Lim, J., Efficient conjunctive keyword search on encrypted data storage system. In: Proceedings of EuroPKI 2006, LNCS. Vol. 4043. pp. 184–196, 2006.

  7. Golle, P., Staddon, J., Waters, B., Secure conjunctive keyword search over encrypted data. In: Proceedings of Applied Cryptography and Network Security Conference, LNCS. Vol. 3089, pp. 31–45, 2004.

  8. Jeong, I. R., and Kwon, J. O., Analysis of some keyword search schemes in encrypted data. IEEE Commun. Lett. 12:213–215, 2008.

    Article  Google Scholar 

  9. Song, D., Wagner, D., Perrig, A., Practical techniques for searches on encrypted data. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, pp. 44–55, 2000.

  10. Abdalla, M. et al., Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J. Cryptol. 21:350–391, 2008.

    Article  MathSciNet  MATH  Google Scholar 

  11. Baek, J., Safavi-Naini, R., Susilo, W., A Public key encryption with keyword search revisited. In: Proceedings of ICCSA 2008, LNCS. Vol. 5072. pp. 1249–1259, 2008.

  12. Boneh, D., Crescenzo, G. D., Ostrovsky, R., Persiano, G., Public key encryption with keyword search. In: Proceedings of EUROCRYPTO’04, LNCS. Vol. 3027. pp. 506–552, 2004.

  13. Park, D. J., Kim, K., Lee, P. J., Public key encryption with conjunctive field keyword search. In: Proceedings of Information Security Applications 2004, LNCS. Vol. 3325. pp. 73–86, 2004.

  14. Rhee, H. S., Park, J. H., Susilo, W., Lee, D. H., Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83:763–771, 2010.

    Article  Google Scholar 

  15. Zhang, B., and Zhang, F., An efficient public key encryption with conjunctive-subset keywords search. J. Netw. Comput. Appl. 34:262–267, 2011.

    Article  Google Scholar 

  16. Bellare, M., Boldyreva, A., O’Neill, A., Deterministic and efficiently searchable encryption. In: Proceedings of CRYPTO’07, LNCS. Vol. 4622. pp. 535–552, 2007.

  17. Brinkman, R., Schoenmakers, B., Doumen, J. M., Jonker, W., Experiments with queries over encrypted data using secret sharing. In: Proceedings of Secure Data Management, LNCS. Vol. 3674. pp. 33-46, 2005.

  18. Goh, E. J., Secure Indexes. The Cryptology ePrint Archive, Report 2003/216. 2004. http://eprint.iacr.org/2003/216.pdf.

  19. Archer, N., and Cocosila, M., A comparison of physician pre-adoption and adoption views on electronic health records in Canadian medical practices. J. Med. Internet Res. 13:3, 2011.

    Article  Google Scholar 

  20. Gunter, T. D., and Nicolas, T. P., The emergence of national electronic health record architectures in the United States and Australia: Models, costs, and questions. J. Med. Internet Res. 7:1, 2005.

    Article  Google Scholar 

  21. Garcia-Smith, D., and Effken, J. A., Development and initial evaluation of the clinical information systems success model (CISSM). Int. J. Med. Inform. 82:539–552, 2013.

    Article  Google Scholar 

  22. Li, J. S., Zhang, X. G., Chu, J., Suzuki, M., Araki, K., Design and development of EMR supporting medical process management. J. Med. Syst. 36:1193–1203, 2012.

    Article  Google Scholar 

  23. Benaloh, J., Chase, M., Horvitz, E., Lauter, K., Patient controlled encryption: ensuring privacy of electronic medical records, Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW ’09). pp. 103–114, 2009.

  24. Bloom, B. H., Space/Time trade-offs in hash coding with allowable errors. Commun. ACM 13:422–426, 1970.

    Article  MATH  Google Scholar 

Download references

Acknowledgement

The research work was partially supported by the National Science Council of the Republic of China (Project Nos. NSC-96-2628-E-005-076-MY3 and NSC-100-2221-E-468-014).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Chi Chen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, YC., Horng, G., Lin, YJ. et al. Privacy Preserving Index for Encrypted Electronic Medical Records. J Med Syst 37, 9992 (2013). https://doi.org/10.1007/s10916-013-9992-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-013-9992-x

Keywords

Navigation