when the data owner makes a time limit for his
one of access control.
5 CONCLUSIONS
In this paper, we construct a scheme for uncertain
users and a fine-grained access control of EHR system
by attribute policy in the cloud. Traditional public
key encryption system is unsuitable to encrypt mul-
tiple to one or multiple to multiple situation. Previ-
ously, access control is aimed to a single known user
who only delegates a known identity. Nowadays, pe-
ople are available to record their health data in EHR
system by moving electronic devices. This function
isn’t limited by time and place, which only needs de-
vice having sufficient power and communication In-
ternet. Consequently, a semi-trusted third cloud plat-
form provides these service in our schema. Moreover,
the patient must have complete control power over
their own data, such as specifying a particular person
viewing the data set, and those who do not match the
attribute policy do not have access to the data set.
As above, the OO-KP-ABE scheme is that the pro-
mising technology should speed up the utilization of
EHR cloud platform in other related works in an elec-
tronic health field.
ACKNOWLEDGEMENTS
This work was supported by National Natural Science
Foundation of China (No. 61472091), Natural
Science Foundation of Guangdong Province for Dis-
tinguished Young Scholars (2014A030306020) and
Science and Technology Planning Project of Guang-
dong Province, China (2015B010129015).
REFERENCES
Beimel, A. a. (1996). Secure schemes for secret sharing and
key distribution. Technion-Israel Institute of techno-
logy, Faculty of computer science.
Benaloh, J., Chase, M., Horvitz, E., and Lauter, K. (2009).
Patient controlled encryption: ensuring privacy of
electronic medical records. In Proceedings of the 2009
ACM workshop on Cloud computing security, pages
103–114. ACM.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In Secu-
rity and Privacy, 2007. SP’07. IEEE Symposium on,
pages 321–334. IEEE.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Persi-
ano, G. (2004). Public key encryption with keyword
search. In International Conference on the Theory
and Applications of Cryptographic Techniques, pages
506–522. Springer.
Boneh, D. and Franklin, M. (2001). Identity-based encryp-
tion from the weil pairing. In Annual International
Cryptology Conference, pages 213–229. Springer.
Buck, C. F. (2007). Designing a consumer-centered perso-
nal health record. Technical report, Technical report,
California Health Foundation.
Fan, K., Huang, N., Wang, Y., Li, H., and Yang, Y. (2015).
Secure and efficient personal health record scheme
using attribute-based encryption. In Cyber Security
and Cloud Computing (CSCloud), 2015 IEEE 2nd In-
ternational Conference on, pages 111–114. IEEE.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In Proceedings of the 13th
ACM conference on Computer and communications
security, pages 89–98. Acm.
Health, U. D., Services, H., et al. (2008). The nation-
wide privacy and security framework for electronic
exchange of individually identifiable health informa-
tion. Office of the National Coordinator for Health
Information Technology.
Hohenberger, S. and Waters, B. (2014). Online/offline
attribute-based encryption. In International Workshop
on Public Key Cryptography, pages 293–310. Sprin-
ger.
Kim, G. R., Lehmann, C. U., on Clinical Informa-
tion Technology, C., et al. (2008). Pediatric aspects of
inpatient health information technology systems. Pe-
diatrics, 122(6):e1287–e1296.
Li, J., Li, J., Chen, X., Jia, C., and Lou, W. (2015).
Identity-based encryption with outsourced revocation
in cloud computing. Ieee Transactions on computers,
64(2):425–437.
Liu, J. K., Au, M. H., Huang, X., Lu, R., and Li, J. (2016).
Fine-grained two-factor access control for web-based
cloud computing services. IEEE Transactions on In-
formation Forensics and Security, 11(3):484–497.
Lohr, S. (2009). Ge and intel join forces on health techno-
logies. New York Times, 3.
Mandl, K. D., Markwell, D., MacDonald, R., Szolovits, P.,
and Kohane, I. S. (2001). Public standards and pa-
tients’ control: how to keep electronic medical records
accessible but privatemedical information: access and
privacydoctrines for developing electronic medical re-
cordsdesirable characteristics of electronic medical
recordschallenges and limitations for electronic medi-
cal recordsconclusionscommentary: Open approaches
to electronic patient recordscommentary: A patient’s
viewpoint. Bmj, 322(7281):283–287.
Meng, D., Wang, W., Luo, E., and Wang, G. (2016).
Attribute-based traceable anonymous proxy signature
strategy for mobile healthcare. In Security, Privacy,
and Anonymity in Computation, Communication, and
Storage: 9th International Conference, SpaCCS 2016,
Zhangjiajie, China, November 16-18, 2016, Procee-
dings 9, pages 178–189. Springer.
Rouselakis, Y. and Waters, B. (2013). Practical con-
structions and new proof methods for large universe
Secure Electronic Health Record System Based on Online/Offline KP-ABE in the Cloud
115