A certificate-based proxy re-encryption plus scheme for secure medical data sharing

被引:4
作者
Liu, Shuanggen [1 ]
Qin, Haozhe [1 ]
Taniar, David [2 ]
Liu, Wandi [1 ]
Li, Yuanjun [1 ]
Zhang, Jindan [3 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian, Peoples R China
[2] Monash Univ, Fac Informat Technol, Melbourne, Australia
[3] Xianyang Vocational& Tech Coll, Xianyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Public cloud storage; Proxy re-encryption plus; Chosen ciphertext attack;
D O I
10.1016/j.iot.2023.100836
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The sharing of medical data is crucial for advancing medical research, but the risk of sharing medical data with malicious users poses a significant problem for smooth sharing among medical institutions. To address this issue, we propose a certificate-based proxy re-encryption plus (CBPRE+) scheme based on certificate-based proxy re-encryption (CBPRE) and message level fine-grained controllable and non-transferable proxy re-encryption plus (PRE+). This scheme allows medical organizations to securely distribute their encrypted data to recipients through public cloud storage. The proposed scheme maintains the benefits of CBPRE, while additionally enabling fine-grained message-level sharing and non-transferability. This ensures that user data is only available to authorized health services, thereby preventing malicious disclosure. We validate and analyze the correctness, safety, and performance of our scheme, and our results show that the scheme has chosen-ciphertext security for the original ciphertext and chosen-plaintext security for the re-encrypted ciphertext. Our proposed scheme offers more advantages than the existing CBPRE scheme.
引用
收藏
页数:20
相关论文
共 46 条
  • [1] COVID-19 Contact Tracing and Data Protection Can Go Together
    Abeler, Johannes
    Baecker, Matthias
    Buermeyer, Ulf
    Zillessen, Hannah
    [J]. JMIR MHEALTH AND UHEALTH, 2020, 8 (04):
  • [2] A View of Cloud Computing
    Armbrust, Michael
    Fox, Armando
    Griffith, Rean
    Joseph, Anthony D.
    Katz, Randy
    Konwinski, Andy
    Lee, Gunho
    Patterson, David
    Rabkin, Ariel
    Stoica, Ion
    Zaharia, Matei
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 50 - 58
  • [3] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
  • [4] Mobile cloud-based physical activity advisory system using biofeedback sensors
    Badawi, Hawazin Faiz
    Dong, Haiwei
    El Saddik, Abdulmotaleb
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 66 : 59 - 70
  • [5] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [6] Braeken A, 2017, PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), P32
  • [7] Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
  • [8] Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    [J]. THEORETICAL COMPUTER SCIENCE, 2021, 871 : 16 - 29
  • [9] A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2907 - 2919
  • [10] Green M, 2007, LECT NOTES COMPUT SC, V4521, P288