Controlling decryption of personal health records in the cloud

Yi Chang Hsu, Jing Jang Hwang*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

For personal health record storage systems in the cloud where the information must be encrypted before storage, we propose splitting the decryption key into two parts, where the user owns one part that is called an ownership code or a right-to-decrypt code, while the other part, called a substitute-key-half code, is stored in the system. The decryption key can only be recovered using these two separate secret parts, and the information stored in the system will not disclose any clues that could lead to guessing the decryption key, thus strengthening information protection and ensuring that the personal health records will not be disclosed to anyone without authorization.

Original languageEnglish
Title of host publicationProceedings of the International Conference on IT Convergence and Security 2011
Pages69-79
Number of pages11
DOIs
StatePublished - 2012
EventInternational Conference on IT Convergence and Security 2011, ICITCS 2011 - Suwon, Korea, Republic of
Duration: 14 12 201116 12 2011

Publication series

NameLecture Notes in Electrical Engineering
Volume120 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

ConferenceInternational Conference on IT Convergence and Security 2011, ICITCS 2011
Country/TerritoryKorea, Republic of
CitySuwon
Period14/12/1116/12/11

Keywords

  • Key recovery computation
  • Personal health records
  • Substitute key computation

Fingerprint

Dive into the research topics of 'Controlling decryption of personal health records in the cloud'. Together they form a unique fingerprint.

Cite this