Skip to main content
Springer Nature - PMC COVID-19 Collection logoLink to Springer Nature - PMC COVID-19 Collection
. 2020 May 31;12157:249–258. doi: 10.1007/978-3-030-51517-1_21

Hybrid and Secure E-Health Data Sharing Architecture in Multi-Clouds Environment

Tayssir Ismail 13,14,, Haifa Touati 13,14, Nasreddine Hajlaoui 13,14, Hassen Hamdi 15
Editors: Mohamed Jmaiel8, Mounir Mokhtari9, Bessam Abdulrazak10, Hamdi Aloulou11, Slim Kallel12
PMCID: PMC7313308

Abstract

Healthcare is among the sectors showing efforts in adopting cloud computing to its services considering the provided cost reduction and healthcare process efficiency. However, outsourcing patient’s sensitive data increases the concerns regarding security, privacy, and integrity of healthcare data. Therefore, there is a need for building a trust relationship between patients and e-health systems. In this paper, we propose a privacy-preserving framework, called Hybrid and Secure Data Sharing Architecture (HSDSA), to secure data storage in e-health systems. Our approach improves security in healthcare by maintaining the privacy and confidentiality of sensitive data and preventing threats. In fact, in the upload phase, Multi-cloud environment is used to store Rivest–Shamir–Adleman (RSA) encrypted medical records. We adopt a Shamir’s secret sharing approach for the distribution of shares to different independent cloud providers. In the retrieval phase, the reconstruction operation is based on the (t, n) strategy. To check the requester identity and to prove the hash possession, we used a zero-knowledge cryptography algorithm, namely the Schnorr algorithm. The patient has a total control over the generation and management of the decryption keys using Diffie-Hellman algorithm without relying on a trusted authority.

Keywords: E-health system security, Privacy preservation, Multi-cloud, Data storage, Data share, Data encryption

Introduction

Cloud computing is a new promising technology that leverages the user from the burden of hardware maintenance and offers dynamically flexible and scalable computational resources accessible from any place where a network is available. The emergence of this paradigm has deeply influenced many domains and especially the healthcare sector. However, the usage of this model in the healthcare domain needs the reinforcement of security measures because data are susceptible to lose, leakage or theft. Therefore, confidentiality and integrity of the stored Electronic Health Records (EHR) are deemed as one of the major challenges elevated by the external storage. Besides, the privacy of sensitive data must be guaranteed. To overcome the above cited challenges, cryptographic techniques for securing e-health systems are widely adopted. But the reliance on a single cloud storage provider has shown many drawbacks like a single point of failure, vendor lock-in and malicious insiders. To narrow down the listed disadvantages, it is advisable to use multi-cloud architecture. One of the key concepts of this model is to store data on different cloud server providers where an insider is not able to reconstruct the original data from a single share [1].

In this context, several solutions have been proposed in the literature to ensure secure multi-cloud storage in e-health systems [25]. They mainly have two phases: storage and retrieval. They also all use cryptographic primitives to ensure EHRs security. Authors of [2] use an Attribute Based-Encryption (ABE) for selective access authorisation and cryptographic secret sharing. The EHRs split and reconstruction is done through a proxy. In [3], ABE is used for selective data sharing with physicians without allowing them to know the precise description of the patient’s illnesses. Biometrics based authentication and Kerberos tickets session are used in [4] to guarantee secure interaction with the EHR system. In addition, a steganographic technique is used to store EHR. In [5], authors propose the use of Shamir’s Secret Sharing not only to distribute EHR shares among cloud servers but to retrieve the requested EHR from partial cloud servers. In summary, the main drawback of [25] is the reliance on a trusted third party which may not be adequate for practical use as they show security risks. Hence, a secure privacy-preserving data storage solution is still needed to improve the patient role to monitor his data on the cloud.

In this paper, we present a Hybrid and Secure Data Sharing Architecture (HSDSA), for secure and privacy-preserving storing and sharing of patient’s sensitive data in a Multi-cloud environment without relying on a trusted third party. In HSDSA, cloud providers are assumed to be semi-trusted: honest but curious. HSDSA gives the patient total control over the generation and management of the decryption keys without relying on a trusted authority and thus it is more applicable for public cloud environments. To protect the data from external attackers, Rivest–Shamir–Adleman (RSA) encryption is applied before outsourcing EHR. To secure data against cloud providers curiosity, Shamir’s secret sharing is adopted. The resulted shares are distributed to multiple clouds. To download an EHR, HSDSA recovers its shares using an outsourcing reconstruction operation based on the (t, n) strategy. To complete the file decryption, a Schnorr-based technique is used to prove data possession and to verify the requester identity. Then a session, using the Diffie Hellman (DH) algorithm, is created to securely exchange the decryption key. Finally, the key is extracted and the original EHR could be recovered. Outsourcing reconstruction operation based on the (t, n) strategy is used.

The remainder of the paper is organised as follows. Section 2 gives an overview of the overall architecture of the proposed framework and its components. Sections 3 and 4 detail the different techniques used in the storage and retrieval processes. Finally, Sect. 5 concludes the paper and highlights some open issues.

Architecture Overview of the Proposed Scheme

We recall that our goal is to securely store EHRs in multi-cloud environment and to securely share them among healthcare organisations staff. In the following, we will give an overview of the HSDSA framework in which we focus on the context of medical data storage, share and retrieval. The basics of HSDSA are shown in Fig. 1. Our system compromises three different entities: Data Owner (DO), Data Requester (DR) and n CSP (Inline graphic,...,Inline graphic). The key components of the HSDSA framework include:

  • The storage process which is composed of two phases, namely the registration phase and the storage phase.

  • The retrieval process which is composed of two phases, namely the EHR reconstruction and the EHR recovery phases.

Fig. 1.

Fig. 1.

Architecture overview

As shown in Fig. 1, the workflow of HSDSA is as follows:

  • The registration phase starts when a DO or a DR signs in to the Framework Interface. After being signed to HSDSA, a DO or a DR receives in response the hash of his identity H(Inline graphic).

  • The storage phase starts when a DO wants to store his EHRs, he calculates the digital signature of his EHR (R), encrypts R using Rivest–Shamir–Adleman (RSA) algorithm for both and logs in to the HSDSA. Then, the DO uploads his encrypted record (Inline graphic) and the hash value of the original record H(R). HSDSA generates a unique identifier (Inline graphic) of the EHR to guarantee the anonymity of stored data in Cloud servers and stores H(Inline graphic), H(R) and Inline graphic. The framework calculates the hash of the uploaded EHR (Inline graphic) and splits it into m shares. Then, it performs an exclusive OR operation between each share (Inline graphic) and the hash value of Inline graphic. The distribution is done using Shamir’s secret sharing algorithm and the resulted shares are sent to n different Cloud Server Providers Inline graphic, ... Inline graphic.

  • The reconstruction phase starts when a DO or an authorised user DR wants to get the EHR, he sends a request to the framework. After confirming the request, HSDSA assigns a CSP (Inline graphic) to perform the reconstruction step. The Inline graphic gets t shares or more from Inline graphic, ... Inline graphic. Once the reconstruction is done, the Inline graphic returns the resulted shares to the framework.

  • Finally, the recovery phase, when the DR wants to get the DO’s private key, he has to prove that he is the right DR and he has the correct hash value of R. To this end, the Schnorr algorithm is used. Once, the DO makes sure that the DR is an authorised requester and that he possesses the encrypted version of the EHR (Inline graphic, then the DR and the DO try to establish a session using Diffie-Hellman (DH) algorithm to exchange decryption key securely. Once they agree on a session key, Inline graphic. The DO encrypts his private key using Inline graphic and sends it to the DR. Once the private key is extracted, the DR can finally recover the desired EHR (R).

Analysis of the Proposed Storage Process

In the following, we detail the techniques used in the two phases of the storage process: the registration phase and the storage phase.

The Registration Phase

As recommended in cloud-based storage solutions, building a trust relationship between partners is a necessity. To achieve this goal, the first step is to make sure that all users are registered to the framework. If a new user wants to benefit from services provided by the HSDSA framework, he must be correctly authenticated. Once he registers, he receives a value containing the hash of his identity H(Inline graphic) in order to maintain the anonymity of user identities.

The Storage Phase

HSDSA acts as an intermediary between DO and CSPs. Our goal is to provide a secure storage facility to authorised users. This phase involves Shamir’s secret sharing technique to make sure that the multi-cloud environment, used to store shares, is a collusion-safe. By collusion-safe we mean that if two or more CSPs combine their keys, they cannot decrypt the data. Ten steps, illustrated in Table 1, describe the storage phase.

Table 1.

Scenario of the storage phase

graphic file with name 501196_1_En_21_Tab1_HTML.jpg

When a DO wants to store an EHR, he calculates the digital signature of the original EHR (R). Then the RSA is used to split the selected EHR into blocks and encrypt them. Sequential execution of RSA needs a lot of calculation. Therefore, we use the enhancement proposed in [6] where authors have parallelized the process of encryption and decryption of a large number of data blocks. The resulted file Inline graphic and H(R) are sent to HSDSA.

graphic file with name M23.gif 1

When the framework receives Inline graphic and H(R), it generates a unique identifier Inline graphic corresponding to the file Inline graphic. This is used to guarantee the unlinkability between DO and EHR. After that, HSDSA computes the hash of Inline graphic (H(Inline graphic)) and stores Inline graphic, H(R) and H(Inline graphic). Next the framework splits Inline graphic into m shares [Inline graphic, ... ,Inline graphic], performs the exclusive OR operation of each split of Inline graphic with H(Inline graphic).

graphic file with name M36.gif 2

[Inline graphic, ... ,Inline graphic] are the shares to be stored in independent CSPs. To securely distribute the shares, we adopted Shamir’s secret sharing protocol. It represents a so-called (t,n) threshold scheme with 1 Inline graphic t Inline graphic n. This mechanism permits the distribution of a document among n parts in a way that reconstruction is possible if at least t shares are present. Suppose a share Inline graphic (for i i = 1 ... m), Shamir’s secret sharing algorithm sets Inline graphic = Inline graphic, chooses Inline graphic, ..., Inline graphic at random, takes distinct values Inline graphic, Inline graphic,..., Inline graphic with m Inline graphic t-1 and computes the shares to distribute, as follows:

graphic file with name M50.gif

In the proposed architecture, HSDSA selects m polynomials.

graphic file with name M51.gif

Where

graphic file with name M52.gif

The HSDSA computes n shares Inline graphic, ..., Inline graphic (i = 1, ..., n) and distributes them to Inline graphic, ..., Inline graphic.

Analysis of the Proposed Retrieval Process

File retrieval, also known as file reconstruction, is the reversal process of file distribution and file slicing. In this framework the retrieval process starts when a data requester DR needs to get an EHR. He must log in and submit the EHR identifier (Inline graphic). HSDSA checks if the DR has the right to get the requested EHR. If the authorisation succeeded, then the reconstruction phase starts.

The Reconstruction Phase

Since the reconstruction of Inline graphic requires a massive amount of computation and that client resources are limited, we will use the reconstruction outsourcing scheme proposed in [5]. The framework assigns a CSP (Inline graphic) to reconstruct shares Inline graphic. The reconstruction is considered successfull only if Inline graphic gets at least t shares from Inline graphic, ..., Inline graphic. We assume that Inline graphic gets k shares.

graphic file with name M65.gif

Inline graphic computes Inline graphic for Inline graphic using Lagrange interpolation polynomial and sends them to HSDSA:

graphic file with name M69.gif 3

To make sure that Inline graphic could not reveal any useful information, knowing that he is a curious and dishonest party, doing an exclusive OR operation helps to blind the content. Upon receipt of the shares, the HSDSA framework performs the exclusive OR operation between Inline graphic and H(Inline graphic) to get Inline graphic.

The Recovery Phase

This phase aims to securely transfer the Data Owner’s private key to the right Data Requester. Table 2 illustrates the main steps related to this phase.

Table 2.

Scenario of the recovery phase

graphic file with name 501196_1_En_21_Tab2_HTML.jpg

Once the reconstruction phase is done, HSDSA sends Inline graphic/Inline graphic to the Data Owner and to the Data Receiver. First the DR has to prove to the DO that he holds the right hash value of the original file Inline graphic and that he is the correct DR. For this purpose, a Schnorr’s identification protocol [7] is used not only to prove the hash possession but also to verify the DR identity. In the process of the latter algorithm the DO checks if H(R) Inline graphic (Inline graphic), and verifies if the n first bits of the DR identity match the Inline graphic previously sent by FI. Then the DO and the DR must establish a secure connection for key exchange, based on Diffie-Hellman (DH) scheme Ephemeral version [8], reinforced with the hash value of the original file (H(R)). Establishing a session means that the two partners have agreed on session key (Inline graphic) that will be used to crypt partners metadata. Next, the DO encrypts his private key (PU) using Inline graphic and sends the resulted value Inline graphic to the DR.

graphic file with name M83.gif 4

The DR decrypts Inline graphic using Inline graphic to extract the DO private key. Possessing PU, the DR decrypts Inline graphic to finally recover the original EHR (R).

graphic file with name M87.gif 5
graphic file with name M88.gif 6

Conclusion

In this paper, we presented HSDSA, a novel architecture for secure EHR. HSDSA includes several techniques, namely (i) RSA algorithm to guarantee the security of outsourced data, (ii) Shamir’s secret sharing to securely distribute data across multiple clouds, (iii) a secure outsourcing reconstruction based on the (tn) strategy, (iv) a Schnorr-based technique to prove data possession and to verify the requester identity and (v) a Diffie-Hellman algorithm to securely exchange decryption key. The proposed scheme allows the patient to get total control over the generation and management of the decryption keys without relying on a trusted authority. In a future work, we plan to add governmental organisation as Data Requester. These latter need to access data without the Data Owner authorisation. Hence, we aim to protect privacy while giving them access to EHR.

Contributor Information

Mohamed Jmaiel, Email: mohamed.jmaiel@redcad.org.

Mounir Mokhtari, Email: mounir.mokhtari@imt.fr.

Bessam Abdulrazak, Email: bessam.abdulrazak@usherbrooke.ca.

Hamdi Aloulou, Email: hamdi.aloulou@gmail.com.

Slim Kallel, Email: slim.kallel@fsegs.usf.tn.

Tayssir Ismail, Email: taissirism88@gmail.com.

Haifa Touati, Email: haifa.touai@cristal.rnu.tn.

Nasreddine Hajlaoui, Email: hajlaoui.ing@gmail.com.

Hassen Hamdi, Email: hhassen2006@yahoo.fr.

References

  • 1.AlZain, M.A., et al.: Cloud computing security: from single to multi-clouds. In: 45th International Conference on System Sciences (2012)
  • 2.Fabian B, Ermakova T, Junghanns P. Collaborative and secure sharing of healthcare data in multi-clouds. Inform. Syst. 2015;48:132–150. doi: 10.1016/j.is.2014.05.004. [DOI] [Google Scholar]
  • 3.Xhafa F, Li J, Zhao G, Li J, Chen X, Wong DS. Designing cloud-based electronic health record system with attribute-based encryption. Multimed. Tools Appl. 2015;74(10):3441–3458. doi: 10.1007/s11042-013-1829-6. [DOI] [Google Scholar]
  • 4.Premarathne US. Hybrid cryptographic access control for cloud based electronic health records systems. IEEE Cloud Comput. 2017;2:1–7. [Google Scholar]
  • 5.Zhang H, Yu J, Tian C, Zhao P, Xu G, Lin J. Cloud storage for electronic health records based on secret sharing with verifiable reconstruction outsourcing. IEEE Access. 2018;6:40713–40722. doi: 10.1109/ACCESS.2018.2857205. [DOI] [Google Scholar]
  • 6.Gupta, P., Verma, D.K., Singh, A. K.: Improving RSA algorithm using multi-threading model for outsourced data security in cloud storage. In: 8th International Conference on Cloud Computing, Data Science & Engineering, pp. 14–15 (2018)
  • 7.Smart NP. Zero-knowledge proofs. In: Smart NP, editor. Cryptography Made Simple. Cham: Springer; 2016. pp. 425–438. [Google Scholar]
  • 8.Blake-Wilson S, Menezes A. Authenticated Diffe-Hellman key agreement protocols. In: Tavares S, Meijer H, editors. Selected Areas in Cryptography. Berlin: Springer; 1998. pp. 339–361. [Google Scholar]

Articles from The Impact of Digital Technologies on Public Health in Developed and Developing Countries are provided here courtesy of Nature Publishing Group

RESOURCES