gation solution used by our system exhibits many ad-
vantages: it is generic enough, it can be easily im-
plemented by a Cloud provider, data can be easily
transferred between Cloud providers that implement
this solution, it protects client privacy against third
parties (including the Cloud providers), and it allows
easy modification of access control policies (Fotiou
et al., 2015).
Each data item is encrypted using a different sym-
metric encryption key, therefore, the compromise of
a symmetric encryption key would require the re-
encryption of that specific item only with another
fresh key. This is an inevitable overhead of all sim-
ilar systems and it is due to the fact that public key
encryption cannot be applied directly to the file con-
tents, due to its computation complexity. Neverthe-
less, for small data items, such as readings from wear-
able devices, it may be possible to negate the need for
symmetric encryption.
5 RELATED WORK
L
¨
ohr et al. (L
¨
ohr et al., 2010) have proposed a solution
for securing e-health clouds based on Trusted Virtual
Domains (TVDs). TVD is a virtualization technique
that creates secure “sandboxes” where user data can
reside. This solution is orthogonal to our system: the
solution by L
¨
ohr et al. concerns the design of secure
clouds specific to e-health services, whereas our so-
lution assumes a generic cloud service and builds a
secure data sharing system on top of it.
Wu et al. (Wu et al., 2012) propose an access con-
trol mechanism for sharing electronic health records
in the Cloud. The main component of their mecha-
nism is an access broker that is responsible for en-
forcing access control policies. The access broker is
an entity shared among many stakeholders, therefore,
privacy concerns are raised. In our work, access con-
trol policies are enforced by data owners in a way that
reveals no information about data owners or clients
to third parties (including the Cloud provider). Son
et al. (Son et al., 2015) propose a mechanism that
supports “dynamic” access control, i.e., access con-
trol that takes into consideration the user’s context.
In their solution, access control is also implemented
in the Cloud, therefore the same privacy concerns are
raised.
Fabian et al. (Fabian et al., 2015) use attribute-
based encryption (ABE) to protect medical data
stored in multi-Cloud environments and shared
among different cooperative organizations. ABE pro-
duces encrypted data in a way that only users with
specific “attributes” can decrypt. In essence, ABE
incorporates access control policies into ciphertexts.
The disadvantage of using ABE for this purpose is
that the loss of a private key that corresponds to an at-
tribute requires the generation of a new key, the distri-
bution of this key to all users that have this attribute,
and the appropriate encryption of all files protected
by this attribute. In contrast, in our system the loss
of the data owner’s secret key only requires a new en-
cryption of all symmetric keys. Similarly, (Li et al.,
2013), (Liu et al., 2015) use attribute-based encryp-
tion to protect personal health records stored in public
cloud environments; these solution also suffer from
the same problems.
Thilakanathan et al. (Thilakanathan et al., 2014)
use ElGamal public key encryption and a proxy re-
encryption like protocol to protect generic health data
stored in the cloud. Their solution relies on a cen-
tralized trusted third party that generates private keys
on behalf of users. In our system users generate their
private keys by themselves, therefore our approach of-
fers increased security.
6 CONCLUSION AND FUTURE
WORK
In this paper we presented a solution that allows se-
cure and privacy preserving storage of medical data
in public Clouds, by leveraging access control dele-
gation and proxy re-encryption. Our solution is based
on a gateway-based design, where a user controlled
gateway is responsible for encrypting user generated
data, as well as for enforcing access control policies.
Future work involves the transfer of the encryp-
tion process to the devices that generate the data. In
this manner, the device could store the data directly
to the Cloud, avoiding the gateway, therefore reduc-
ing communication overhead. Currently, our work as-
sumes that devices can be securely authenticated to
the gateway and, similarly, the gateway can be se-
curely authenticated to the Cloud. Future enhance-
ments of our system would also consider and imple-
ment these functions.
REFERENCES
Akinyele, J., Garman, C., Miers, I., Pagano, M., Rushanan,
M., Green, M., and Rubin, A. (2013). Charm:
a framework for rapidly prototyping cryptosystems.
Journal of Cryptographic Engineering, 3(2):111–128.
Boneh, D., Boyen, X., and Goh, E.-J. (2005). Hierarchical
identity based encryption with constant size cipher-
text. In Cramer, R., editor, Advances in Cryptology
Protecting Medical Data Stored in Public Clouds
131