Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems

被引:7
作者
Trivedi, Hiral S. [1 ,2 ]
Patel, Sankita J. [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Dept Comp Sci & Engn, Surat, Gujarat, India
[2] Sardar Vallabhbhai Natl Inst Technol, Dept Comp Sci & Engn, Surat 395007, Gujarat, India
关键词
INTERNET; EFFICIENT; SECURITY; PROTOCOL;
D O I
10.1002/ett.4734
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Adopting Internet-of-Things (IoT) enables pervasive computing by integrating distributed healthcare infrastructures to enhance conventional medical services. Integrated healthcare systems store numerous encrypted electronic health records (EHR) on clouds that multiple users frequently access as per delegated access rights. Sharing any group of selected EHR within any group of users involving different encryption keys potentially heightens security and privacy concerns over inadvertent data leaks. This necessitates a searchable encryption mechanism in distributed IoT requiring secure multi-user authorization and efficient searchable keys management with compact trapdoors. Contemporary state-of-the-art protocols utilize large numbers of expensive encryption keys and keyword trapdoors while lacking secure multi-user authorization and keyword untraceability on clouds. This motivates us to design a novel key-aggregate searchable encryption protocol that jointly achieves multi-user authorization and keyword untraceability for distributed IoT applications. Key-aggregation reduces complexity in sharing (n)$$ (n) $$ documents by executing a stand-alone trapdoor, while token-based authorization allows keyword search only to legitimate data users. Additionally, secure dynamic indexing achieves keyword untraceability on clouds. Security analysis illustrates correctness and resilience against typical attacks. Performance and empirical analysis demonstrate a relative advantage in storage, communication, and computational costs while incorporating secure multi-user authorization and keyword untraceability as additional security features.
引用
收藏
页数:24
相关论文
共 40 条
[1]  
[Anonymous], 2013, P 17 INT C FIN CRYPT
[2]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[3]   A Survey of Provably Secure Searchable Encryption [J].
Bosch, Christoph ;
Hartel, Pieter ;
Jonker, Willem ;
Peter, Andreas .
ACM COMPUTING SURVEYS, 2015, 47 (02)
[4]  
Chai Q, 2012, IEEE ICC
[5]   Privacy Preserving Searchable Encryption with Fine-Grained Access Control [J].
Chaudhari, Payal ;
Das, Manik Lal .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (02) :753-762
[6]  
Chen, 2020, INT J INF SECUR, V20, P1, DOI [10.1007/s10207-020-00524-5, DOI 10.1007/S10207]
[7]   Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data [J].
Chen, Biwen ;
Wu, Libing ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond ;
He, Debiao .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (04) :1753-1764
[8]   Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage [J].
Cui, Baojiang ;
Liu, Zheli ;
Wang, Lingyu .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2374-2385
[9]   Secure Keyword Search and Data Sharing Mechanism for Cloud Computing [J].
Ge, Chunpeng ;
Susilo, Willy ;
Liu, Zhe ;
Xia, Jinyue ;
Szalachowski, Pawel ;
Fang Liming .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) :2787-2800
[10]   Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage [J].
Guo, Lifeng ;
Yau, Wei-Chuen .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (02)