Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud

被引:4
作者
Sun, Yuqin [1 ]
Han, Lidong [1 ,2 ]
Bi, Jingguo [3 ]
Tan, Xiao [1 ,2 ]
Xie, Qi [2 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Technol, Hangzhou, Peoples R China
[2] Hangzhou Normal Univ, Key Lab Cryptog Technol Zhejiang Prov, Hangzhou, Peoples R China
[3] Beijing Univ Posts & Telecommun BUPT, Sch Cyberspace secur, Beijing, Peoples R China
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2023年 / 12卷 / 01期
基金
中国国家自然科学基金;
关键词
Searchable encryption; Ciphertext-policy ABE; Multi-keyword search; Discrete-logarithm problem; Decisional bilinear Diffie-Hellman assumption; Indistinguishability; Unforgeability;
D O I
10.1186/s13677-023-00451-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Personal health record (PHR) is a medical model in which patients can upload their medical records and define the access control by themselves. Since the limited local storage and the development of cloud computing, many PHR services have been outsourced to the cloud. In order to ensure the privacy of electronic medical records, patients intend to encrypt their health records before uploading them. However, encrypted PHR can not be accessed directly and not be retrieved by legitimate users. To solve these issues, in this article we propose a new searchable encryption scheme with ciphertext-policy attributes, which achieves fine-grained access control and exact keyword search over encrypted PHRs. Moreover, in our proposed scheme, the receiver can verify the integrity of the search result that the cloud server returns. Finally, we simulate our scheme, and the experiments show that our scheme has high practicability for cloud-based healthcare systems and has high efficiency in aspects of keyword search and results verification.
引用
收藏
页数:13
相关论文
共 35 条
  • [1] Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    Miao, Yinbin
    Vasilakos, Athanasios V.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [2] Attribute-based fine-grained access control for outscored private set intersection computation
    Ali, Mohammad
    Mohajeri, Javad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    [J]. INFORMATION SCIENCES, 2020, 536 : 222 - 243
  • [3] Personal health records: a scoping review
    Archer, N.
    Fevrier-Thomas, U.
    Lokker, C.
    McKibbon, K. A.
    Straus, S. E.
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2011, 18 (04) : 515 - 522
  • [4] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [5] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [6] AKSER: Attribute-based keyword search with efficient revocation in cloud computing
    Cui, Jie
    Zhou, Han
    Zhong, Hong
    Xu, Yan
    [J]. INFORMATION SCIENCES, 2018, 423 : 343 - 352
  • [7] Gao Jian, 2015, Journal of Northeastern University. Natural Science, V36, P1416, DOI 10.3969/j.issn.1005-3026.2015.10.011
  • [8] Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data
    Ge, Xinrui
    Yu, Jia
    Chen, Fei
    Kong, Fanyu
    Wang, Huaqun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) : 12902 - 12918
  • [9] Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
    Ge, Xinrui
    Yu, Jia
    Zhang, Hanlin
    Hu, Chengyu
    Li, Zengpeng
    Qin, Zhan
    Hao, Rong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 490 - 504
  • [10] Ibraimi L., 2009, "Facing Future Health Care Needs". Proceedings 2009 6th International Workshop on Wearable Micro and Nanosystems for Personalized Health (pHealth 2009), P71, DOI 10.1109/PHEALTH.2009.5754828