Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds

被引:75
作者
Guo, Cheng [1 ,2 ]
Zhuang, Ruhan [1 ,2 ]
Jie, Yingmo [1 ,2 ]
Ren, Yizhi [3 ,4 ]
Wu, Ting [3 ]
Choo, Kim-Kwang Raymond [5 ,6 ,7 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian, Peoples R China
[3] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou, Zhejiang, Peoples R China
[4] Hangzhou Dianzi Univ, Minist Educ China, Key Lab Complex Syst Modeling & Simulat, Hangzhou, Zhejiang, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX USA
[6] Univ South Australia, Sch Informat Technol & Math Sci, Adelaide, SA, Australia
[7] China Univ Geosci, Sch Comp Sci, Wuhan, Peoples R China
基金
美国国家科学基金会;
关键词
Searchable encryption; Ciphertext-policy attribute-based encryption; Cloud computing; E-healthcare; Access control;
D O I
10.1007/s10916-016-0588-0
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
An effectively designed e-healthcare system can significantly enhance the quality of access and experience of healthcare users, including facilitating medical and healthcare providers in ensuring a smooth delivery of services. Ensuring the security of patients' electronic health records (EHRs) in the e-healthcare system is an active research area. EHRs may be outsourced to a third-party, such as a community healthcare cloud service provider for storage due to cost-saving measures. Generally, encrypting the EHRs when they are stored in the system (i.e. data-at-rest) or prior to outsourcing the data is used to ensure data confidentiality. Searchable encryption (SE) scheme is a promising technique that can ensure the protection of private information without compromising on performance. In this paper, we propose a novel framework for controlling access to EHRs stored in semi-trusted cloud servers (e.g. a private cloud or a community cloud). To achieve fine-grained access control for EHRs, we leverage the ciphertext-policy attribute-based encryption (CP-ABE) technique to encrypt tables published by hospitals, including patients' EHRs, and the table is stored in the database with the primary key being the patient's unique identity. Our framework can enable different users with different privileges to search on different database fields. Differ from previous attempts to secure outsourcing of data, we emphasize the control of the searches of the fields within the database. We demonstrate the utility of the scheme by evaluating the scheme using datasets from the University of California, Irvine.
引用
收藏
页数:8
相关论文
共 27 条
[1]   A survey of information security incident handling in the cloud [J].
Ab Rahman, Nurul Hidayah ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2015, 49 :45-69
[2]  
[Anonymous], 2010, P 5 ACM S INF COMP C
[3]  
[Anonymous], FACULTY PUBLICATIONS
[4]  
[Anonymous], P 15 ACM C COMP COMM
[5]  
[Anonymous], SECURE MANAGEMENT PE
[6]  
[Anonymous], 2006, IACR CRYPTOL EPRINT
[7]  
[Anonymous], INT C COMP COMM
[8]  
[Anonymous], IEEE T DEPEND SECURE
[9]  
[Anonymous], DICTIONARY
[10]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+