Open Access
ARTICLE
Fog-Based Secure Framework for Personal Health Records Systems
1 Department of Computer & Information Security, Sejong University, Seoul, 05006, Korea
2 Department of Computer Science and Engineering, Sejong University, Seoul, 05006, Korea
3 Department of Computer Science, University of Alabama at Birmingham, Birmingham, AL, 35294, USA
4 Department of Software Engineering, King Saud University, Riyadh, 11543, Saudi Arabia
* Corresponding Author: Lewis Nkenyereye. Email:
(This article belongs to the Special Issue: Intelligent Decision Support Systems for Complex Healthcare Applications)
Computers, Materials & Continua 2021, 66(2), 1937-1948. https://doi.org/10.32604/cmc.2020.013025
Received 22 July 2020; Accepted 26 September 2020; Issue published 26 November 2020
Abstract
The rapid development of personal health records (PHR) systems enables an individual to collect, create, store and share his PHR to authorized entities. Health care systems within the smart city environment require a patient to share his PRH data with a multitude of institutions’ repositories located in the cloud. The cloud computing paradigm cannot meet such a massive transformative healthcare systems due to drawbacks including network latency, scalability and bandwidth. Fog computing relieves the load of conventional cloud computing by availing intermediate fog nodes between the end users and the remote servers. Assuming a massive demand of PHR data within a ubiquitous smart city, we propose a secure and fog assisted framework for PHR systems to address security, access control and privacy concerns. Built under a fog-based architecture, the proposed framework makes use of efficient key exchange protocol coupled with ciphertext attribute based encryption (CP-ABE) to guarantee confidentiality and fine-grained access control within the system respectively. We also make use of digital signature combined with CP-ABE to ensure the system authentication and users privacy. We provide the analysis of the proposed framework in terms of security and performance.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.