A time-aware searchable encryption scheme for EHRs

被引:0
作者
Yousheng Zhou [1 ,2 ]
Xiaofeng Zhao [1 ]
Siling Liu [1 ]
Xingwang Long [1 ]
Wenjun Luo [1 ,2 ]
机构
[1] College of Computer Science and Technology, Chongqing University of Posts and Telecommunications
[2] School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications
关键词
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密]; R197.323 [业务管理];
学科分类号
0839 ; 1402 ; 1004 ; 120402 ;
摘要
Despite the benefits of EHRs(Electronic Health Records), there is a growing concern over the risks of privacy exposure associated with the technologies of EHR storing and transmission. To deal with this problem, a timeaware searchable encryption with designated server is proposed in this paper. It is based on Boneh's public key encryption with keyword search and Rivest's timed-release cryptology. Our construction has three features: the user cannot issue a keyword search query successfully unless the search falls into the specific time range; only the authorized user can generate a valid trapdoor; only the designated server can execute the search. Applying our scheme in a multi-user environment, the number of the keyword ciphertexts would not increase linearly with the number of the authorized users. The security and performance analysis shows that our proposed scheme is securer and more efficient than the existing similar schemes.
引用
收藏
页码:170 / 175
页数:6
相关论文
共 9 条
[1]   Progress and Challenges in Electronic Health Record Adoption: Findings From a National Survey of Physicians [J].
DesRoches, Catherine .
ANNALS OF INTERNAL MEDICINE, 2015, 162 (05) :396-396
[2]   Cloud-Based Hospital Information System as a Service for Grassroots Healthcare Institutions [J].
Yao, Qin ;
Han, Xiong ;
Ma, Xi-Kun ;
Xue, Yi-Feng ;
Chen, Yi-Jun ;
Li, Jing-Song .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (09)
[3]  
Efficient searchable ID-based encryption with a designated server.[J].Tsu-Yang Wu;Tung-Tso Tsai;Yuh-Min Tseng.annals of telecommunications - annales des télécommunications.2014, 7-8
[4]   Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption [J].
Li, Ming ;
Yu, Shucheng ;
Zheng, Yao ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (01) :131-143
[5]   Criteria for the Evaluation of a Cloud-Based Hospital Information System Outsourcing Provider [J].
Low, Chinyao ;
Chen, Ya Hsueh .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) :3543-3553
[6]   Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies [J].
Carrion Senor, Inmaculada ;
Luis Fernandez-Aleman, Jose ;
Toval, Ambrosio .
JOURNAL OF MEDICAL INTERNET RESEARCH, 2012, 14 (04) :e114
[7]  
Generic construction of designated tester public-key encryption with keyword search.[J].Hyun Sook Rhee;Jong Hwan Park;Dong Hoon Lee.Information Sciences.2012,
[8]  
Trapdoor security in a searchable public-key encryption scheme with a designated tester.[J].Hyun Sook Rhee;Jong Hwan Park;Willy Susilo;Dong Hoon Lee.The Journal of Systems & Software.2009, 5
[9]   Provably secure timed-release public key encryption [J].
Cheon, Jung Hee ;
Hopper, Nicholas ;
Kim, Yongdae ;
Osipkov, Ivan .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (02)