Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud

被引:4
|
作者
Najafi, Aniseh [1 ]
Bayat, Majid [2 ]
Javadi, Hamid Haj Seyyed [1 ]
机构
[1] Shahed Univ, Dept Math & Comp Sci, Tehran, Iran
[2] Shahed Univ, Dept Comp Engn, Tehran, Iran
关键词
Attribute-Based Searchable Encryption; Hidden Policy; Keyword Guessing Attack; Secure Channel Free; Standard Model; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; HIDDEN; SCHEMES;
D O I
10.22042/isecure.2021.227562.542
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of cloud computing in the healthcare system makes accuracy and speed increased, costs reduced, and health services widely used. However, system users are always seriously concerned about the security of outsourced data. The ciphertext-policy attribute-based encryption (CP-ABE) is a promising way to ensure the security of and facilitate access control over outsourced data. However, conventional CP-ABE schemes have security flaws such as lack of attribute privacy and resistance to the keywords guessing attacks as well as the disability to multi-keyword searches. To meet such shortcomings, we present a scheme supporting multi-keyword search and fine-grained access control, simultaneously. The proposed scheme is resistant to the offline keywords guessing attack. Privacy-preserving in the access structure is another feature of the proposed scheme. The security analysis indicates that our scheme is selectively secure in the standard model. Finally, the performance evaluation of the proposed scheme shows the efficiency is reasonable despite the added functionalities. (C) 2020 ISC. All rights reserved.
引用
收藏
页码:87 / 100
页数:14
相关论文
共 50 条
  • [31] Verifiable attribute-based keyword search encryption with attribute revocation for electronic health record system
    Liu, Zhenhua
    Liu, Yan
    Xu, Jing
    Wang, Baocang
    Liu, Yan (ly10_xidian@163.com), 1600, Femto Technique Co., Ltd. (22): : 845 - 856
  • [32] Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing
    Lyu, Maoxu
    Li, Xuejun
    Li, Hui
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 195 - 204
  • [33] Secure Access Control of E-Health System with Attribute-Based Encryption
    Yan, Hongyang
    Li, Jin
    Li, Xuan
    Zhao, Gansen
    Lee, Sun-Young
    Shen, Jian
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2016, 22 (03): : 345 - 352
  • [34] An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage
    Huang, Chanying
    Wei, Songjie
    Fu, Anmin
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2019, 28 (11)
  • [35] Conjunctive Broadcast and Attribute-Based Encryption
    Attrapadung, Nuttapong
    Imai, Hideki
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 248 - 265
  • [36] Attribute-Based Proxy Re-Encryption with Keyword Search
    Shi, Yanfeng
    Liu, Jiqiang
    Han, Zhen
    Zheng, Qingji
    Zhang, Rui
    Qiu, Shuo
    PLOS ONE, 2014, 9 (12):
  • [37] Attribute-based keyword search encryption for power data protection
    Zhang, Xun
    Mu, Dejun
    Zhao, Jinxiong
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (02):
  • [38] Privacy Preserving Lightweight Searchable Encryption for Cloud Assisted e-Health System
    Altaf, Fahiem
    Aditia, Mayank
    Saini, Ekta
    Rakshit, Bodhisattwa
    Maity, Soumyadev
    2019 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET 2019): ADVANCING WIRELESS AND MOBILE COMMUNICATIONS TECHNOLOGIES FOR 2020 INFORMATION SOCIETY, 2019, : 310 - 314
  • [39] A keyword searchable attribute-based encryption scheme with attribute update for cloud storage
    Wang, Shangping
    Ye, Jian
    Zhang, Yaling
    PLOS ONE, 2018, 13 (05):
  • [40] Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System
    Miao, Yinbin
    Li, Feng
    Li, Xinghua
    Ning, Jianting
    Li, Hongwei
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1845 - 1862