Efficient Attribute-Based Searchable Encryption With Policy Hiding Over Personal Health Records

被引:0
|
作者
Zhang, Boyu [1 ]
Yang, Wenjie [2 ]
Zhang, Futai [2 ]
Ning, Jianting [3 ,4 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Fujian Normal Univ, Coll Comp & Cyber Secur, Key Lab Analyt Math & Applicat, Minist Educ, Fuzhou 350007, Peoples R China
[4] City Univ Macau, Fac Data Sci, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Servers; Encryption; Cloud computing; Security; Medical services; Keyword search; Access control; attribute-based encryption; fast keyword search; hidden policy; PUBLIC-KEY ENCRYPTION; KEYWORD SEARCH; SECURE; SCHEME;
D O I
10.1109/TDSC.2024.3432769
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the introduction of cloud computing in healthcare services, personal health records (PHRs) have being uploaded to cloud servers in increasing numbers. Since data confidentiality requirements exist, data owners should encrypt their PHRs in advance of transmitting them to a cloud server. Attribute-based encryption with keyword search (ABKS) technique ensures that the encrypted PHRs are able to retrieved by other data users whose attributes match access polices granted by data owners. However, access polices are public in most existing ABKS schemes, which can reveal sensitive information contained in PHRs. In this article, we provide an efficient ABKS scheme with policy hiding for PHRs that implements the following features. (1) The fine-grained access control is achieved where data owners can authorize which data users can retrieve encrypted PHRs. (2) The access policy is hidden to safeguard sensitive information from being leaked. (3) The costs of storage and computation do not grow linearly as the number of attributes increases. The security of the presented ABKS scheme is reduced to the truncated q-DABDHE assumption and the DDH assumption. Its performance is also demonstrated by our extensive simulation experiments.
引用
收藏
页码:1299 / 1312
页数:14
相关论文
共 50 条
  • [21] Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption
    Fan, Kai
    Huang, Nana
    Wang, Yue
    Li, Hui
    Yang, Yintang
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 111 - 114
  • [22] Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments
    Yu, Yong
    Shi, Junbin
    Li, Huilin
    Li, Yannan
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (06) : 1242 - 1251
  • [23] Online/offline attribute-based searchable encryption revised: Flexibility, security and efficiency
    Meng, Fei
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 146
  • [24] Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things
    Zeng, Peng
    Zhang, Zhiting
    Lu, Rongxing
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10963 - 10972
  • [25] Efficient Attribute-Based Encryption Outsourcing Scheme With User and Attribute Revocation for Fog-Enabled IoT
    Li, Ling
    Wang, Zheng
    Li, Na
    IEEE ACCESS, 2020, 8 : 176738 - 176749
  • [26] KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption
    Chaudhari, Payal
    Das, Manik Lal
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) : 1036 - 1044
  • [27] An optimized dynamic attribute-based searchable encryption scheme
    Khan, Shahzad
    Khan, Shawal
    Waheed, Abdul
    Mehmood, Gulzar
    Zareei, Mahdi
    Alanazi, Faisal
    PLOS ONE, 2024, 19 (10):
  • [28] An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-Policy Attribute-Based Encryption With Keyword Search
    Gao, Jian
    Zhou, Fucai
    IEEE ACCESS, 2022, 10 : 8184 - 8193
  • [29] Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search
    Shi, Junbin
    Yu, Qiming
    Yu, Yong
    Wang, Lianhai
    Zhang, Wenzheng
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 12152 - 12168
  • [30] Efficient ciphertext-policy attribute-based encryption with blackbox traceability
    Xu, Shengmin
    Yuan, Jiaming
    Xu, Guowen
    Li, Yingjiu
    Liu, Ximeng
    Zhang, Yinghui
    Ying, Zuobin
    INFORMATION SCIENCES, 2020, 538 : 19 - 38