A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud

被引:22
作者
Pussewalage, Harsha Sandaruwan Gardiyawasam [1 ]
Oleshchuk, Vladimir [1 ]
机构
[1] Univ Agder UiA, Dept Informat & Commun Technol, N-4898 Grimstad, Norway
关键词
Cryptography; Hospitals; Cloud computing; Medical services; Encryption; Collaboration; Data privacy; Access control; attribute based encryption; controlled delegation; security; privacy; PROXY RE-ENCRYPTION; IMPROVING PRIVACY; EFFICIENT; SECURITY;
D O I
10.1109/TSC.2022.3174909
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization and growing utilization of electronic health records (EHRs) coupled with the advancements in cloud computing, healthcare providers are interested in storing EHRs in third-party, semi-trusted cloud platforms. Given the collaborative nature of modern e-health environments, integrating access delegation is of paramount importance to strengthen the flexibility of the sharing of health information. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. For such applications, attribute based encryption (ABE) mechanisms are quite useful given the fact that ABE facilitates an efficient way of enforcing secure, fine-grained access control over encrypted data. However, incorporating delegatability with ABE mechanisms is tricky, and the existing schemes lack the control over the process of delegation of encrypted data. As a solution, we propose a novel ABE based access control scheme which can enforce multi-level, controlled access delegation and demonstrated how it could be deployed in an e-health environment to securely share outsourced EHRs of patients. Furthermore, we have shown that the proposed scheme is secure against chosen plaintext attacks as well as attacks mounted via attribute collusion.
引用
收藏
页码:787 / 801
页数:15
相关论文
共 38 条
  • [1] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
  • [2] Barker E., 2016, NIST SPEC PUBL, V800, P1, DOI DOI 10.6028/NIST.SP.800-57PT1R4
  • [3] ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing
    Barua M.
    Liang X.
    Lu R.
    Shen X.
    [J]. International Journal of Security and Networks, 2011, 6 (2-3) : 67 - 76
  • [4] Barua M., 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P970, DOI 10.1109/INFCOMW.2011.5928953
  • [5] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [6] Security Audits of Multi-tier Virtual Infrastructures in Public Infrastructure Clouds
    Bleikertz, Soren
    Schunter, Matthias
    Probst, Christian W.
    Pendarakis, Dimitrios
    Eriksson, Konrad
    [J]. PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:), 2010, : 93 - 102
  • [7] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
  • [8] Securing Patient-Centric Personal Health Records Sharing System in Cloud Computing
    Chen Danwei
    Chen Linling
    Fan Xiaowei
    He Liwen
    Pan Su
    Hu Ruoxiang
    [J]. CHINA COMMUNICATIONS, 2014, 11 (01) : 121 - 127
  • [9] Chow S. S., 2016, P 21 ACM ACM S CONTR, P215, DOI DOI 10.1145/2914642.2914659
  • [10] Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189