Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing

被引:3
|
作者
Roy, Sujoy [1 ]
Agrawal, Jeet [1 ]
Kumar, Alok [1 ]
Rao, Udai Pratap [2 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Comp Sci & Engn, Surat 395007, Gujarat, India
[2] Natl Inst Technol Patna, Comp Sci & Engn, Patna 800005, Bihar, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 05期
关键词
Attribute authority (AA); Ciphertext policy-attribute based encryption (CP-ABE); Electronic health records (EHRs); Access structure; Multi-authority; Hierarchical access tree structure; Policy-hiding; Revocation; PROXY RE-ENCRYPTION; ACCESS-CONTROL SCHEME; EFFICIENT; HIDDEN;
D O I
10.1007/s10586-024-04283-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The modern medical system is convergence of cutting-edge technologies and advancements in the healthcare environment. In the modern medical system, the storage of electronic health records is generally leased out to third-party cloud service providers (CSPs). But, CSPs cannot be entirely relied upon due to the potential security and privacy issues. This article presents Multi-Authority and Hierarchical Attribute-Based Encryption Scheme (MH-ABE) scheme to promote secure information sharing and protect patient's privacy. The utilization of CP-ABE in conjunction with multiple Attribute Authorities within the proposed MH-ABE scheme presents a scalable and fine-grained approach to data access control. The proposed MH-ABE scheme incorporates the utilization of a Hierarchical Access Tree to effectively encrypt numerous files concurrently, hence reducing the computational and storage cost. The proposed scheme has also been evaluated using a comparative analysis with existing schemes, emphasizing the assessment of computational and storage costs. The findings of this analysis demonstrate improved performance and efficiency of the proposed ciphertext policy based encryption scheme. The proposed MH-ABE scheme incorporates features such as policy hiding and revocation, and it exhibits resilience against attacks, including collusion resistance, Indistinguishability under chosen-plaintext attack and forward secrecy.
引用
收藏
页码:6013 / 6038
页数:26
相关论文
共 50 条
  • [1] Multi-authority Attribute Based Encryption Scheme with Revocation
    Huang, XiaoFang
    Tao, Qi
    Qin, BaoDong
    Liu, ZhiQin
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [2] A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy
    Qi, Fang
    Li, Ke
    Tang, Zhe
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 607 - 613
  • [3] A secure multi-authority attribute based encryption approach for robust smart grids
    Saidi, Ahmed
    Amira, Abdelouahab
    Nouali, Omar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (07)
  • [4] A Multi-authority Attribute-based Encryption Scheme with Pre-decryption
    Chen, Danwei
    Wan, Liangqing
    Wang, Chen
    Pan, Su
    Ji, Yuting
    2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 223 - 228
  • [5] Anonymous Electronic Health Record Sharing Scheme Based on Decentralized Hierarchical Attribute-Based Encryption in Cloud Environment
    Liu, Xueyan
    Yang, Xiaotao
    Luo, Yukun
    Wang, Li
    Zhang, Qiang
    IEEE ACCESS, 2020, 8 : 200180 - 200193
  • [6] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [7] Multi-authority Based Weighted Attribute Encryption Scheme in Cloud Computing
    Wang, Yun
    Zhang, Dalei
    Zhong, Hong
    2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 1033 - 1038
  • [8] New Multi-authority Attribute-based Encryption Scheme on Lattices
    Yan Xixi
    Liu Yuan
    Li Zichen
    Tang Yongli
    Ye Qing
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (04) : 811 - 817
  • [9] HABEm: Hierarchical Attribute Based Encryption with Multi-Authority for the Mobile Cloud Service
    Qian, He
    Jing, Song
    Hong, Xu
    Yong, Wang
    2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2020, : 524 - 529
  • [10] Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks
    Luo, Entao
    Liu, Qin
    Wang, Guojun
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (09) : 1772 - 1775