Efficient Attribute-Based Searchable Encryption With Policy Hiding Over Personal Health Records

被引:0
|
作者
Zhang, Boyu [1 ]
Yang, Wenjie [2 ]
Zhang, Futai [2 ]
Ning, Jianting [3 ,4 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Fujian Normal Univ, Coll Comp & Cyber Secur, Key Lab Analyt Math & Applicat, Minist Educ, Fuzhou 350007, Peoples R China
[4] City Univ Macau, Fac Data Sci, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Servers; Encryption; Cloud computing; Security; Medical services; Keyword search; Access control; attribute-based encryption; fast keyword search; hidden policy; PUBLIC-KEY ENCRYPTION; KEYWORD SEARCH; SECURE; SCHEME;
D O I
10.1109/TDSC.2024.3432769
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the introduction of cloud computing in healthcare services, personal health records (PHRs) have being uploaded to cloud servers in increasing numbers. Since data confidentiality requirements exist, data owners should encrypt their PHRs in advance of transmitting them to a cloud server. Attribute-based encryption with keyword search (ABKS) technique ensures that the encrypted PHRs are able to retrieved by other data users whose attributes match access polices granted by data owners. However, access polices are public in most existing ABKS schemes, which can reveal sensitive information contained in PHRs. In this article, we provide an efficient ABKS scheme with policy hiding for PHRs that implements the following features. (1) The fine-grained access control is achieved where data owners can authorize which data users can retrieve encrypted PHRs. (2) The access policy is hidden to safeguard sensitive information from being leaked. (3) The costs of storage and computation do not grow linearly as the number of attributes increases. The security of the presented ABKS scheme is reduced to the truncated q-DABDHE assumption and the DDH assumption. Its performance is also demonstrated by our extensive simulation experiments.
引用
收藏
页码:1299 / 1312
页数:14
相关论文
共 50 条
  • [1] Attribute-Based Searchable Encryption: A Survey
    Yan, Li
    Wang, Gaozhou
    Yin, Tian
    Liu, Peishun
    Feng, Hongxin
    Zhang, Wenbin
    Hu, Hailin
    Pan, Fading
    ELECTRONICS, 2024, 13 (09)
  • [2] Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain
    Zhang, Leyou
    Zhang, Tianshuai
    Wu, Qing
    Mu, Yi
    Rezaeibagha, Fatemeh
    IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14): : 12482 - 12496
  • [3] Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption
    Liu, Zhenhua
    Ji, Jiaqi
    Yin, Fangfang
    Wang, Baocang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (01): : 323 - 342
  • [4] An Attribute-Based Searchable Encryption Scheme for Cloud-Assisted IIoT
    Yin, Hui
    Zhang, Wei
    Deng, Hua
    Qin, Zheng
    Li, Keqin
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) : 11014 - 11023
  • [5] An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things
    Li, Hang
    Yu, Keping
    Liu, Bin
    Feng, Chaosheng
    Qin, Zhiguang
    Srivastava, Gautam
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 1949 - 1960
  • [6] A Blockchain-Based Anonymous Attribute-Based Searchable Encryption Scheme for Data Sharing
    Zhang, Kai
    Zhang, Yan
    Li, Yanping
    Liu, Ximeng
    Lu, Laifeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 1685 - 1697
  • [7] Attribute-Based Encryption With Blockchain Protection Scheme for Electronic Health Records
    Jiang, Yu
    Xu, Xiaolong
    Xiao, Fu
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04): : 3884 - 3895
  • [8] An efficient KP design framework of attribute-based searchable encryption for user level revocation in cloud
    Mamta
    Gupta, B. B.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18)
  • [9] Online/offline ciphertext-policy attribute-based searchable encryption
    Chen D.
    Cao Z.
    Dong X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2365 - 2375
  • [10] Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System
    Zhang, Leyou
    Hu, Gongcheng
    Mu, Yi
    Rezaeibagha, Fatemeh
    IEEE ACCESS, 2019, 7 : 33202 - 33213