A searchable personal health records framework with fine-grained access control in cloud-fog computing

被引:21
作者
Sun, Jin [1 ]
Wang, Xiaojing [1 ]
Wang, Shangping [1 ]
Ren, Lili [1 ]
机构
[1] Xian Univ Technol, Sch Sci, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
ATTRIBUTE-BASED ENCRYPTION; OUTSOURCED DECRYPTION; SECURE;
D O I
10.1371/journal.pone.0207543
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Fog computing can extend cloud computing to the edge of the network so as to reduce latency and network congestion. However, existing encryption schemes were rarely used in fog environment, resulting in high computational and storage overhead. Aiming at the demands of local information for terminal device and the shortcomings of cloud computing framework in supporting mobile applications, by taking the hospital scene as an example, a searchable personal health records framework with fine-grained access control in cloud-fog computing is proposed. The proposed framework combines the attribute-based encryption (ABE) technology and search encryption (SE) technology to implement keyword search function and fine-grained access control ability. When keyword index and trapdoor match are successful, the cloud server provider only returns relevant search results to the user, thus achieving a more accurate search. At the same time, the scheme is multi-authority, and the key leakage problem is solved by dividing the user secret key distribution task. Moreover, in the proposed scheme, we securely outsource part of the encryption and decryption operations to the fog node. It is effective both in local resources and in resource-constrained mobile devices. Based on the decisional q-parallel bilinear Diffie-Hellman exponent (q-DBDHE) assumption and decisional bilinear Diffie-Hellman (DBDH) assumption, our scheme is proven to be secure. Simulation experiments show that our scheme is efficient in the cloud-fog environment.
引用
收藏
页数:23
相关论文
共 30 条
[1]  
[Anonymous], INFORM SCI
[2]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]  
Bonomi F., 2012, P MCCWORKSHOP MOB CL, P13, DOI 10.1145/2342509.2342513
[4]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[5]   Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing [J].
Cui, Helei ;
Yuan, Xingliang ;
Wang, Cong .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (05) :1315-1329
[6]  
Dubarry E, 2007, AM CHIROPRACTOR, V10, P70
[7]  
Duquesne S, 2005, MATH IISC ERNET, V22, p573 , DOI DOI 10.1109/ISCC.2011.5983948
[8]  
Endsley Scott, 2006, Fam Pract Manag, V13, P57
[9]  
Fangming Zhao, 2012, Information Security and Cryptology - ICISC 2011. 14th International Conference. Revised Selected Papers, P406, DOI 10.1007/978-3-642-31912-9_27
[10]  
Goyal V., 2006, 13 ACM CONFCOMPUT CO, P89, DOI DOI 10.1145/1180405.1180418