Efficient Attribute-Based Searchable Encryption With Policy Hiding Over Personal Health Records

被引:0
|
作者
Zhang, Boyu [1 ]
Yang, Wenjie [2 ]
Zhang, Futai [2 ]
Ning, Jianting [3 ,4 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Fujian Normal Univ, Coll Comp & Cyber Secur, Key Lab Analyt Math & Applicat, Minist Educ, Fuzhou 350007, Peoples R China
[4] City Univ Macau, Fac Data Sci, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Servers; Encryption; Cloud computing; Security; Medical services; Keyword search; Access control; attribute-based encryption; fast keyword search; hidden policy; PUBLIC-KEY ENCRYPTION; KEYWORD SEARCH; SECURE; SCHEME;
D O I
10.1109/TDSC.2024.3432769
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the introduction of cloud computing in healthcare services, personal health records (PHRs) have being uploaded to cloud servers in increasing numbers. Since data confidentiality requirements exist, data owners should encrypt their PHRs in advance of transmitting them to a cloud server. Attribute-based encryption with keyword search (ABKS) technique ensures that the encrypted PHRs are able to retrieved by other data users whose attributes match access polices granted by data owners. However, access polices are public in most existing ABKS schemes, which can reveal sensitive information contained in PHRs. In this article, we provide an efficient ABKS scheme with policy hiding for PHRs that implements the following features. (1) The fine-grained access control is achieved where data owners can authorize which data users can retrieve encrypted PHRs. (2) The access policy is hidden to safeguard sensitive information from being leaked. (3) The costs of storage and computation do not grow linearly as the number of attributes increases. The security of the presented ABKS scheme is reduced to the truncated q-DABDHE assumption and the DDH assumption. Its performance is also demonstrated by our extensive simulation experiments.
引用
收藏
页码:1299 / 1312
页数:14
相关论文
共 50 条
  • [31] A Key-Policy Searchable Attribute-Based Encryption Scheme for Efficient Keyword Search and Fine-Grained Access Control over Encrypted Data
    Yin, Hui
    Xiong, Yinqiao
    Zhang, Jixin
    Ou, Lu
    Liao, Shaolin
    Qin, Zheng
    ELECTRONICS, 2019, 8 (03)
  • [32] Novel Searchable Attribute-Based Encryption for the Internet of Things
    Lu, Zhenhua
    Guo, Yuyan
    Li, Jiguo
    Jia, Weina
    Lv, Liping
    Shen, Jie
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [33] An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups
    Meng, Ru
    Zhou, Yanwei
    Ning, Jianting
    Liang, Kaitai
    Han, Jinguang
    Susilo, Willy
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 39 - 56
  • [34] Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing
    Wu, Axin
    Zheng, Dong
    Zhang, Yinghui
    Yang, Menglei
    SENSORS, 2018, 18 (07)
  • [35] Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
    Li, Ming
    Yu, Shucheng
    Zheng, Yao
    Ren, Kui
    Lou, Wenjing
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (01) : 131 - 143
  • [36] Attribute-Based Encryption with Expressive and Authorized Keyword Search
    Cui, Hui
    Deng, Robert H.
    Liu, Joseph K.
    Li, Yingjiu
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 106 - 126
  • [37] Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption
    Kim, Intae
    Susilo, Willy
    Baek, Joonsang
    Kim, Jongkil
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1856 - 1870
  • [38] Blockchain-based attribute-based keyword searchable encryption for health cloud system
    Zhang, Fan
    Zhang, Yinghui
    Han, Gang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2022, 15 (06) : 493 - 504
  • [39] Distributed and Privacy-Preserving Data Dissemination at the Network Edge via Attribute-Based Searchable Encryption
    Huso, Ingrid
    Piro, Giuseppe
    Boggia, Gennaro
    2022 20TH MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE (MEDCOMNET), 2022,
  • [40] Certificateless searchable attribute-based encryption approach for cloud data based on blockchain
    Jeba, J. Monisha Privthy
    Vivekrabinson, K.
    Raja, B. Shanmuga
    Sundareswaran, N.
    Vijay, M.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2024, 45 (04) : 239 - 253