Comparison of attribute-based encryption schemes in securing healthcare systems
dc.contributor.author | Walid, Redwan | |
dc.contributor.author | Joshi, Karuna | |
dc.contributor.author | Choi, Seung Geol | |
dc.date.accessioned | 2024-04-10T19:05:41Z | |
dc.date.available | 2024-04-10T19:05:41Z | |
dc.date.issued | 2024-03-26 | |
dc.description.abstract | E-health has become a top priority for healthcare organizations focused on advancing healthcare services. Thus, medical organizations have been widely adopting cloud services, resulting in the effective storage of sensitive data. To prevent privacy and security issues associated with the data, attribute-based encryption (ABE) has been a popular choice for encrypting private data. Likewise, the attribute-based access control (ABAC) technique has been widely adopted for controlling data access. Researchers have proposed electronic health record (EHR) systems using ABE techniques like ciphertext policy attribute-based encryption (CP-ABE), key policy attribute-based encryption (KP-ABE), and multi authority attribute-based encryption (MA-ABE). However, there is a lack of rigorous comparison among the various ABE schemes used in healthcare systems. To better understand the usability of ABE techniques in medical systems, we performed a comprehensive review and evaluation of the three popular ABE techniques by developing EHR systems using knowledge graphs with the same data but different encryption mechanisms. We have used the MIMIC-III dataset with varying record sizes for this study. This paper can help healthcare organizations or researchers using ABE in their systems to comprehend the correct usage scenario and the prospect of ABE deployment in the most recent technological evolution. | |
dc.description.sponsorship | This work has been supported by the Office of Naval Research under Grants N00014-18-1-2453, N00014-19-WX-00568, and N00014-20-WX01704 and by NSF Grant 1955319. We thank Dr. Michael A. Grasso for his vital feedback. | |
dc.description.uri | https://www.nature.com/articles/s41598-024-57692-w | |
dc.format.extent | 14 pages | |
dc.genre | journal articles | |
dc.identifier | doi:10.13016/m2hgbs-r3cl | |
dc.identifier.citation | Walid, Redwan, Karuna Pande Joshi, and Seung Geol Choi. “Comparison of Attribute-Based Encryption Schemes in Securing Healthcare Systems.” Scientific Reports 14, no. 1 (March 26, 2024): 7147. https://doi.org/10.1038/s41598-024-57692-w. | |
dc.identifier.uri | https://doi.org/10.1038/s41598-024-57692-w | |
dc.identifier.uri | http://hdl.handle.net/11603/32981 | |
dc.language.iso | en_US | |
dc.publisher | Springer Nature | |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department | |
dc.relation.ispartof | UMBC Student Collection | |
dc.relation.ispartof | UMBC Information Systems Department | |
dc.rights | CC BY 4.0 DEED Attribution 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/deed.en | |
dc.subject | Computer science | |
dc.subject | Health policy | |
dc.subject | Health services | |
dc.subject | Information technology | |
dc.subject | Software | |
dc.subject | UMBC Ebiquity Research Group | |
dc.title | Comparison of attribute-based encryption schemes in securing healthcare systems | |
dc.type | Text | |
dcterms.creator | https://orcid.org/0000-0002-1303-0909 | |
dcterms.creator | https://orcid.org/0000-0002-6354-1686 |
Files
Original bundle
1 - 1 of 1