Secure collaborative EHR Sharing using multi-authority attribute-based proxy re-encryption in Web 3.0

被引:1
作者
Duan, Pengfei [1 ]
Gao, Hongmin [2 ]
Shen, Yushi [3 ]
Guo, Zhetao [4 ]
Ma, Zhaofeng [1 ]
Tian, Tian [1 ]
Zhang, Yuqing [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[2] China Mobile Informat Technol Co Ltd, Beijing, Peoples R China
[3] NovNet Comp Syst Technol Co Ltd, Beijing, Peoples R China
[4] Cloudspace Technol Co Ltd, Beijing, Peoples R China
关键词
Web; 3.0; Cross-domain EHR sharing; Multi-authority attribute-based; Proxy re-encryption; Access control; Patient-centric; Security; SCHEME;
D O I
10.1016/j.comnet.2024.110851
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Web 3.0 represents a transformative shift toward a decentralized, intelligent, and user-centric Internet. Existing electronic health record (EHR) sharing systems depend on centralized cloud servers for storage and management, with hospitals serving as primary custodians. This centralization often results inpatients losing control and visibility over their EHR data, including who accesses it and how it is utilized, which contradicts the decentralized principles of Web 3.0. In this context, we propose a multi-authority attribute-based proxy re-encryption scheme that facilitates collaborative EHR sharing in Web 3.0. Our design allows the updating of ciphertext policies, thereby eliminating the need for frequent re-encryption of plaintext data amid varying cross-domain access policies. Furthermore, our scheme utilizes blockchain technology to create a decentralized and transparent environment that enables traceable cross-domain EHR sharing records. Additionally, we integrate hybrid encryption with decentralized data hosting platforms, significantly reducing the on-chain storage burden. The use of smart contracts automates the cross-domain EHR sharing and guarantees a fair distribution of benefits among all participants. Security analysis confirms that our scheme is secure against chosen plaintext attacks and resistant to collusion. Performance analysis and simulation experiments validate the efficiency and robustness of our scheme.
引用
收藏
页数:12
相关论文
共 44 条
  • [1] Abed S.A., 2023, J. Artif. Intell., V2023, P1
  • [2] Charm: a framework for rapidly prototyping cryptosystems
    Akinyele, Joseph A.
    Garman, Christina
    Miers, Ian
    Pagano, Matthew W.
    Rushanan, Michael
    Green, Matthew
    Rubin, Aviel D.
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) : 111 - 128
  • [3] [Anonymous], 2001, Advanced Encryption Standard (AES), Federal Inf. Process. Stds. (NIST FIPS), DOI DOI 10.6028/NIST.FIPS.197
  • [4] bcos, about us
  • [5] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [6] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
  • [7] Cui Jiasheng, 2023, 2023 IEEE International Conference on Web Services (ICWS), P698, DOI 10.1109/ICWS60048.2023.00089
  • [8] Next-generation study databases require FAIR, EHR-integrated, and scalable Electronic Data Capture for medical documentation and decision support
    Dugas, Martin
    Blumenstock, Max
    Dittrich, Tobias
    Eisenmann, Urs
    Feder, Stephan Christoph
    Fritz-Kebede, Fleur
    Kessler, Lucy J.
    Klass, Maximilian
    Knaup, Petra
    Lehmann, Christoph U.
    Merzweiler, Angela
    Niklas, Christian
    Pausch, Thomas M.
    Zental, Nelly
    Ganzinger, Matthias
    [J]. NPJ DIGITAL MEDICINE, 2024, 7 (01)
  • [9] Self-verifiable content using decentralized identifiers
    Fotiou, Nikos
    Thomas, Yannis
    Siris, Vasilios A.
    Xylomenos, George
    Polyzos, George C.
    [J]. COMPUTER NETWORKS, 2023, 230
  • [10] Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption
    Gao, Juntao
    Yu, Haiyong
    Zhu, Xiuqin
    Li, Xuelian
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 5233 - 5244