Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System

被引:28
作者
Ming, Yang [1 ]
Zhang, Tingting [1 ]
机构
[1] Changan Univ, Sch Informat Engn, Xian 710064, Shaanxi, Peoples R China
关键词
electronic health records; privacy preserving; access control; attribute-based signcryption; cuckoo filter; ATTRIBUTE-BASED SIGNCRYPTION; SECURE; ENCRYPTION; CLOUDS;
D O I
10.3390/s18103520
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The sharing of electronic health records (EHR) in cloud servers is an increasingly important development that can improve the efficiency of medical systems. However, there are several concerns focusing on the issues of security and privacy in EHR system. The EHR data contains the EHR owner's sensitive personal information, if these data are obtained by a malicious user, it will not only cause the leakage of patient's privacy, but also affect the doctor's diagnosis. It is a very challenging problem for the EHR owner fully controls over own EHR data as well as preserves the privacy of himself. In this paper, we propose a new privacy-preserving access control (PPAC) scheme for EHR. To achieve fine-grained access control of the EHR data, we utilize the attribute-based signcryption (ABSC) mechanism to signcrypt data based on the access policy for the linear secret sharing schemes. Employing the cuckoo filter to hide the access policy, it could protect the EHR owner's privacy information. In addition, the security analysis shows that the proposed scheme is provably secure under the decisional bilinear Diffie-Hellman exponent assumption and the computational Diffie-Hellman exponent assumption in the standard model. Furthermore, the performance analysis indicates that the proposed scheme achieves low costs of communication and computation compared with the related schemes, meanwhile preserves the EHR owner's privacy. Therefore, the proposed scheme is better suited to EHR system.
引用
收藏
页数:25
相关论文
共 49 条
[1]  
Akinyele JosephA., 2011, P 1 ACM WORKSHOP SEC, P75, DOI DOI 10.1145/2046614.2046628
[2]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[3]   Tree-Based Cryptographic Access Control [J].
Alderman, James ;
Farley, Naomi ;
Crampton, Jason .
COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 :47-64
[4]   Internet of surveillance: a cloud supported large-scale wireless surveillance system [J].
Alsmirat, Mohammad A. ;
Jararweh, Yaser ;
Obaidat, Islam ;
Gupta, Brij B. .
JOURNAL OF SUPERCOMPUTING, 2017, 73 (03) :973-992
[5]  
Badve OP, 2015, 2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), P584, DOI 10.1109/GCCE.2015.7398603
[6]  
Ball M., 2006, J HEALTHCARE INFORM, V21, P76
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[9]   Supporting dynamic updates in storage clouds with the Akl-Taylor scheme [J].
Castiglione, Arcangelo ;
De Santis, Alfredo ;
Masucci, Barbara ;
Palmieri, Francesco ;
Huang, Xinyi ;
Castiglione, Aniello .
INFORMATION SCIENCES, 2017, 387 :56-74
[10]   Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes [J].
Castiglione, Arcangelo ;
De Santis, Alfredo ;
Masucci, Barbara .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (04) :451-460