Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices 2011
DOI: 10.1145/2046614.2046628
|View full text |Cite
|
Sign up to set email alerts
|

Securing electronic medical records using attribute-based encryption on mobile devices

Abstract: We provide a design and implementation of self-protecting electronic medical records (EMRs) using attribute-based encryption on mobile devices. Our system allows healthcare organizations to export EMRs to locations outside of their trust boundary. In contrast to previous approaches, our solution is designed to maintain EMR availability even when providers are o✏ine, i.e., where network connectivity is not available. To balance the needs of emergency care and patient privacy, our system is designed to provide f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
90
0
2

Year Published

2013
2013
2017
2017

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 164 publications
(92 citation statements)
references
References 24 publications
0
90
0
2
Order By: Relevance
“…Authors in (Akinyele et al, 2010) described ABE in two formulations: ciphertext policy ABE and key policy ABE, explained in the following.…”
Section: Attribute-based Encryption Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Authors in (Akinyele et al, 2010) described ABE in two formulations: ciphertext policy ABE and key policy ABE, explained in the following.…”
Section: Attribute-based Encryption Solutionsmentioning
confidence: 99%
“…Collusion resistance is a basic feature of ABE systems (Akinyele et al, 2010). This feature is about individuals who are not able to integrate attributes with their secret keys to fulfill a given policy.…”
Section: Attribute-based Encryption Solutionsmentioning
confidence: 99%
“…But the system is only designed for online access control. More recently, Akinyele et al [1] presented a system along with a mobile app for iPhone for secure offline access to EHRs. They constructed their scheme based on ABE (Key-Policy and Ciphertext-Policy versions) and they developped a corresponding software library to help the implementation.…”
Section: Figmentioning
confidence: 99%
“…We could not compare our ABE scheme timings against [2], because this work only implements the decryption algorithm and it does not presents the exact timings. Table 6 reports the timings obtained when a 6-attribute policy is employed in the ABE protocol.…”
Section: Attribute-based Encryption Costsmentioning
confidence: 99%
“…In [1], the authors advocate the use of affine coordinates could be more attractive than the projective ones when implementing pairings in constrained devices, whereas the software library of [13] reports the current record in the computation of a single asymmetric pairing at the 128, 224 and 320-bit security levels. As for the implementation of pairingbased protocols on mobile devices, the only work that we are aware of is [2], where the authors described the design of an attribute-based encryption scheme able to preserve the confidentiality of the medical electronic records generated within a hospital environment.…”
Section: Introductionmentioning
confidence: 99%