Privacy-Preserving Medical Data Sharing Scheme Based on Two-Party Cloud-Assisted PSI

被引:4
作者
Lai, Chengzhe [1 ]
Zhang, Hanyue [1 ]
Lu, Rongxing [2 ]
Zheng, Dong [3 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
[2] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[3] Xian Univ Posts & Telecommun, Natl Engn Res Ctr Secured Wireless, Xian 710121, Peoples R China
基金
中国国家自然科学基金;
关键词
Big data; cloud computing; privacy; private set intersection (PSI); security; SET INTERSECTION;
D O I
10.1109/JIOT.2024.3350029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The conflict between data privacy and sharing among healthcare institutions creates data silos, causing wasteful duplication, incomplete information, and potential hindrances to scientific research. In this article, we present a privacy-preserving medical data sharing scheme based on cloud-assisted private set intersection (PSI) and aggregate signature technique. First, we propose a novel authenticated cloud-assisted PSI, named AC-PSI, which can achieve client authentication and randomized processing of private data by using Diffie-Hellman-based oblivious pseudorandom function (DH-OPRF) and vector oblivious linear-function evaluation-based oblivious pseudorandom function (VOLE-OPRF), respectively. Second, based on the AC-PSI and locally verifiable signature (LVS), we design a privacy-preserving and secure medical data sharing scheme, which can provide enhanced security features by enabling access control of computing resources and resist precomputation attacks from external sources. Our approach has been proven through a rigorous analysis of security. Finally, through comparative analysis with the existing schemes, it is demonstrated that the proposed AC-PSI and medical data sharing scheme has low communication and computation overhead while achieving a higher level of privacy preservation and security.
引用
收藏
页码:15855 / 15868
页数:14
相关论文
共 41 条
[11]   Locally Verifiable Signature and Key Aggregation [J].
Goyal, Rishab ;
Vaikuntanathan, Vinod .
ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 :761-791
[12]   Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT [J].
Hao, Jialu ;
Tang, Wenjuan ;
Huang, Cheng ;
Liu, Jian ;
Wang, Huimei ;
Xian, Ming .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) :933-947
[13]   A blockchain-based scheme for privacy-preserving and secure sharing of medical data [J].
Huang, Haiping ;
Zhu, Peng ;
Xiao, Fu ;
Sun, Xiang ;
Huang, Qinglong .
COMPUTERS & SECURITY, 2020, 99
[14]  
Huberman B. A., 1999, P ACM C EL COMM EC99, P78, DOI DOI 10.1145/336992.337012
[15]  
Ibraimi L, 2008, LECT NOTES COMPUT SC, V5159, P185, DOI 10.1007/978-3-540-85259-9_12
[16]  
Ishai Y, 2003, LECT NOTES COMPUT SC, V2729, P145
[17]   Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) [J].
Jarecki, Stanislaw ;
Kiayias, Aggelos ;
Krawczyk, Hugo ;
Xu, Jiayu .
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, :276-291
[18]  
Jarecki S, 2010, LECT NOTES COMPUT SC, V6280, P418, DOI 10.1007/978-3-642-15317-4_26
[19]  
Jarecki S, 2009, LECT NOTES COMPUT SC, V5444, P577
[20]   Scaling Private Set Intersection to Billion-Element Sets [J].
Kamara, Seny ;
Mohassel, Payman ;
Raykova, Mariana ;
Sadeghian, Saeed .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :195-215