Efficient Attribute-Based Searchable Encryption With Policy Hiding Over Personal Health Records

被引:3
作者
Zhang, Boyu [1 ]
Yang, Wenjie [2 ]
Zhang, Futai [2 ]
Ning, Jianting [3 ,4 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Fujian Normal Univ, Coll Comp & Cyber Secur, Key Lab Analyt Math & Applicat, Minist Educ, Fuzhou 350007, Peoples R China
[4] City Univ Macau, Fac Data Sci, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Servers; Encryption; Cloud computing; Security; Medical services; Keyword search; Access control; attribute-based encryption; fast keyword search; hidden policy; PUBLIC-KEY ENCRYPTION; KEYWORD SEARCH; SECURE; SCHEME;
D O I
10.1109/TDSC.2024.3432769
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the introduction of cloud computing in healthcare services, personal health records (PHRs) have being uploaded to cloud servers in increasing numbers. Since data confidentiality requirements exist, data owners should encrypt their PHRs in advance of transmitting them to a cloud server. Attribute-based encryption with keyword search (ABKS) technique ensures that the encrypted PHRs are able to retrieved by other data users whose attributes match access polices granted by data owners. However, access polices are public in most existing ABKS schemes, which can reveal sensitive information contained in PHRs. In this article, we provide an efficient ABKS scheme with policy hiding for PHRs that implements the following features. (1) The fine-grained access control is achieved where data owners can authorize which data users can retrieve encrypted PHRs. (2) The access policy is hidden to safeguard sensitive information from being leaked. (3) The costs of storage and computation do not grow linearly as the number of attributes increases. The security of the presented ABKS scheme is reduced to the truncated q-DABDHE assumption and the DDH assumption. Its performance is also demonstrated by our extensive simulation experiments.
引用
收藏
页码:1299 / 1312
页数:14
相关论文
共 48 条
[21]   Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage [J].
Koo, Dongyoung ;
Hur, Junbeom ;
Yoon, Hyunsoo .
COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (01) :34-46
[22]   Efficient Similarity Search over Encrypted Data [J].
Kuzu, Mehmet ;
Islam, Mohammad Saiful ;
Kantarcioglu, Murat .
2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, :1156-1167
[23]   Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT [J].
Li, Jiguo ;
Zhang, Yichen ;
Ning, Jianting ;
Huang, Xinyi ;
Poh, Geong Sen ;
Wang, Debang .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) :762-773
[24]   EMK-ABSE: Efficient Multikeyword Attribute-Based Searchable Encryption Scheme Through Cloud-Edge Coordination [J].
Liu, Jingwei ;
Li, Yating ;
Sun, Rong ;
Pei, Qingqi ;
Zhang, Ning ;
Dong, Mianxiong ;
Leung, Victor C. M. .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (19) :18650-18662
[25]   Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE [J].
Liu, Pengliang ;
Wang, Jianfeng ;
Ma, Hua ;
Nie, Haixin .
2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, :584-589
[26]   Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs [J].
Lu, Yang ;
Li, Jiguo ;
Wang, Fen .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) :2696-2706
[27]   ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data [J].
Luo, Fucai ;
Wang, Haiyan ;
Lin, Changlu ;
Yan, Xingfu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :4970-4983
[28]   Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data [J].
Miao, Yinbin ;
Deng, Robert H. ;
Liu, Ximeng ;
Choo, Kim-Kwang Raymond ;
Wu, Hongjun ;
Li, Hongwei .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) :1667-1680
[29]   Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing [J].
Miao, Yinbin ;
Ma, Jianfeng ;
Liu, Ximeng ;
Li, Xinghua ;
Jiang, Qi ;
Zhang, Junwei .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (06) :985-998
[30]   Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing [J].
Miao, Yinbin ;
Ma, Jianfeng ;
Liu, Ximeng ;
Weng, Jian ;
Li, Hongwei ;
Li, Hui .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (05) :772-785