Efficient Attribute-Based Searchable Encryption With Policy Hiding Over Personal Health Records

被引:0
|
作者
Zhang, Boyu [1 ]
Yang, Wenjie [2 ]
Zhang, Futai [2 ]
Ning, Jianting [3 ,4 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Fujian Normal Univ, Coll Comp & Cyber Secur, Key Lab Analyt Math & Applicat, Minist Educ, Fuzhou 350007, Peoples R China
[4] City Univ Macau, Fac Data Sci, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Servers; Encryption; Cloud computing; Security; Medical services; Keyword search; Access control; attribute-based encryption; fast keyword search; hidden policy; PUBLIC-KEY ENCRYPTION; KEYWORD SEARCH; SECURE; SCHEME;
D O I
10.1109/TDSC.2024.3432769
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the introduction of cloud computing in healthcare services, personal health records (PHRs) have being uploaded to cloud servers in increasing numbers. Since data confidentiality requirements exist, data owners should encrypt their PHRs in advance of transmitting them to a cloud server. Attribute-based encryption with keyword search (ABKS) technique ensures that the encrypted PHRs are able to retrieved by other data users whose attributes match access polices granted by data owners. However, access polices are public in most existing ABKS schemes, which can reveal sensitive information contained in PHRs. In this article, we provide an efficient ABKS scheme with policy hiding for PHRs that implements the following features. (1) The fine-grained access control is achieved where data owners can authorize which data users can retrieve encrypted PHRs. (2) The access policy is hidden to safeguard sensitive information from being leaked. (3) The costs of storage and computation do not grow linearly as the number of attributes increases. The security of the presented ABKS scheme is reduced to the truncated q-DABDHE assumption and the DDH assumption. Its performance is also demonstrated by our extensive simulation experiments.
引用
收藏
页码:1299 / 1312
页数:14
相关论文
共 50 条
  • [41] Searchable Ciphertext-Policy Attribute-Based Encryption with Multi-Keywords for Secure Cloud Storage
    Zhao, Zhiyuan
    Sun, Lei
    Li, Zuohui
    Liu, Ying
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018), 2018, : 35 - 41
  • [42] Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records
    Liu, Suhui
    Chen, Liquan
    Wu, Ge
    Wang, Huaqun
    Yu, Hongtao
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3210 - 3223
  • [43] Multidata-Owner Searchable Encryption Scheme Over Medical Cloud Data With Efficient Access Control
    Abdelfattah, Sherif
    Baza, Mohamed
    Mahmoud, Mohamed M. E. A.
    Fouda, Mostafa M.
    Abualsaud, Khalid A.
    Guizani, Mohsen
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 5067 - 5078
  • [44] Ciphertext-Policy Attribute-Based Signcryption with Verifiable Outsourced Designcryption for Sharing Personal Health Records
    Deng, Fuhu
    Wang, Yali
    Peng, Li
    Xiong, Hu
    Geng, Ji
    Qin, Zhiguang
    IEEE ACCESS, 2018, 6 : 39473 - 39486
  • [45] Searchable Attribute-based Encryption Scheme for Dynamic User Groups
    Wang J.-W.
    Ning J.-T.
    Xu S.-M.
    Yin X.-C.
    Chen H.-X.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1907 - 1925
  • [46] Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing
    Zhu, Huijun
    Wang, Licheng
    Ahmad, Haseeb
    Niu, Xinxin
    IEEE ACCESS, 2017, 5 : 20428 - 20439
  • [47] EMK-ABSE: Efficient Multikeyword Attribute-Based Searchable Encryption Scheme Through Cloud-Edge Coordination
    Liu, Jingwei
    Li, Yating
    Sun, Rong
    Pei, Qingqi
    Zhang, Ning
    Dong, Mianxiong
    Leung, Victor C. M.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (19) : 18650 - 18662
  • [48] An Attribute-based Searchable Encryption Scheme Supporting Trapdoor Updating
    Xu, Jingjing
    Ying, Chun
    Tan, Shuhua
    Sun, Zhe
    Wang, Pan
    Sun, Zhixin
    2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 7 - 14
  • [49] ABSTRACT: Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX
    Michalas, Antonis
    Bakas, Alexandros
    Hai-Van Dang
    Zalitko, Alexandr
    CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 183 - 183
  • [50] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27