Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing

被引:3
作者
Roy, Sujoy [1 ]
Agrawal, Jeet [1 ]
Kumar, Alok [1 ]
Rao, Udai Pratap [2 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Comp Sci & Engn, Surat 395007, Gujarat, India
[2] Natl Inst Technol Patna, Comp Sci & Engn, Patna 800005, Bihar, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 05期
关键词
Attribute authority (AA); Ciphertext policy-attribute based encryption (CP-ABE); Electronic health records (EHRs); Access structure; Multi-authority; Hierarchical access tree structure; Policy-hiding; Revocation; PROXY RE-ENCRYPTION; ACCESS-CONTROL SCHEME; EFFICIENT; HIDDEN;
D O I
10.1007/s10586-024-04283-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The modern medical system is convergence of cutting-edge technologies and advancements in the healthcare environment. In the modern medical system, the storage of electronic health records is generally leased out to third-party cloud service providers (CSPs). But, CSPs cannot be entirely relied upon due to the potential security and privacy issues. This article presents Multi-Authority and Hierarchical Attribute-Based Encryption Scheme (MH-ABE) scheme to promote secure information sharing and protect patient's privacy. The utilization of CP-ABE in conjunction with multiple Attribute Authorities within the proposed MH-ABE scheme presents a scalable and fine-grained approach to data access control. The proposed MH-ABE scheme incorporates the utilization of a Hierarchical Access Tree to effectively encrypt numerous files concurrently, hence reducing the computational and storage cost. The proposed scheme has also been evaluated using a comparative analysis with existing schemes, emphasizing the assessment of computational and storage costs. The findings of this analysis demonstrate improved performance and efficiency of the proposed ciphertext policy based encryption scheme. The proposed MH-ABE scheme incorporates features such as policy hiding and revocation, and it exhibits resilience against attacks, including collusion resistance, Indistinguishability under chosen-plaintext attack and forward secrecy.
引用
收藏
页码:6013 / 6038
页数:26
相关论文
共 50 条
  • [21] Collusion-Resistant Multi-Authority Electronic Health Records Sharing Scheme
    Wang J.-W.
    Wu J.-W.
    Yin X.-C.
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (05): : 1179 - 1186
  • [22] LWE-based multi-authority attribute-based encryption scheme with hidden policies
    Tian, Qiuting
    Han, Dezhi
    Liu, Xingao
    Yu, Xueshan
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 19 (02) : 233 - 241
  • [23] Quorum and non-quorum based hierarchical multi-authority access control scheme for secure data sharing in cloud based environment
    Parte, Smita Athanere
    Thakur, Ramesh
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [24] SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT
    Gong, Bei
    Guo, Chong
    Guo, Chong
    Guo, Chen
    Sun, Yao
    Waqas, Muhammad
    Chen, Sheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1299 - 1312
  • [25] Multi-authority attribute-based identification scheme
    Tang F.
    Bao J.
    Huang Y.
    Huang D.
    Wang H.
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 220 - 228
  • [26] Efficient Multi-Authority CP-ABE IoT Data Sharing Scheme with Hidden Policies
    Zhang X.
    Yao Y.
    Fu J.
    Xie H.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (10): : 2193 - 2202
  • [27] Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4098 - 4109
  • [28] Secure collaborative EHR Sharing using multi-authority attribute-based proxy re-encryption in Web 3.0
    Duan, Pengfei
    Gao, Hongmin
    Shen, Yushi
    Guo, Zhetao
    Ma, Zhaofeng
    Tian, Tian
    Zhang, Yuqing
    [J]. COMPUTER NETWORKS, 2024, 255
  • [29] Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
    Ming, Yang
    He, Baokang
    Wang, Chenhao
    [J]. IEEE ACCESS, 2021, 9 : 42593 - 42603
  • [30] A revocable multi-authority attribute-based encryption scheme for fog-enabled IoT
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 155