Efficient Attribute-Based Searchable Encryption With Policy Hiding Over Personal Health Records

被引:3
作者
Zhang, Boyu [1 ]
Yang, Wenjie [2 ]
Zhang, Futai [2 ]
Ning, Jianting [3 ,4 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Fujian Normal Univ, Coll Comp & Cyber Secur, Key Lab Analyt Math & Applicat, Minist Educ, Fuzhou 350007, Peoples R China
[4] City Univ Macau, Fac Data Sci, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Servers; Encryption; Cloud computing; Security; Medical services; Keyword search; Access control; attribute-based encryption; fast keyword search; hidden policy; PUBLIC-KEY ENCRYPTION; KEYWORD SEARCH; SECURE; SCHEME;
D O I
10.1109/TDSC.2024.3432769
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the introduction of cloud computing in healthcare services, personal health records (PHRs) have being uploaded to cloud servers in increasing numbers. Since data confidentiality requirements exist, data owners should encrypt their PHRs in advance of transmitting them to a cloud server. Attribute-based encryption with keyword search (ABKS) technique ensures that the encrypted PHRs are able to retrieved by other data users whose attributes match access polices granted by data owners. However, access polices are public in most existing ABKS schemes, which can reveal sensitive information contained in PHRs. In this article, we provide an efficient ABKS scheme with policy hiding for PHRs that implements the following features. (1) The fine-grained access control is achieved where data owners can authorize which data users can retrieve encrypted PHRs. (2) The access policy is hidden to safeguard sensitive information from being leaked. (3) The costs of storage and computation do not grow linearly as the number of attributes increases. The security of the presented ABKS scheme is reduced to the truncated q-DABDHE assumption and the DDH assumption. Its performance is also demonstrated by our extensive simulation experiments.
引用
收藏
页码:1299 / 1312
页数:14
相关论文
共 48 条
[1]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[2]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[3]   Lattice-Based Public Key Searchable Encryption from Experimental Perspectives [J].
Behnia, Rouzbeh ;
Ozmen, Muslum Ozgur ;
Yavuz, Attila Altay .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) :1269-1282
[4]  
Bing Wang, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P2092, DOI 10.1109/INFOCOM.2015.7218594
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]  
Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
[7]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[8]  
Chaudhari P., 2017, P INT C MATH COMP, P16
[9]   KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption [J].
Chaudhari, Payal ;
Das, Manik Lal .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) :1036-1044
[10]   Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Wang, Xiaofen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) :789-798