Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds

被引:75
作者
Guo, Cheng [1 ,2 ]
Zhuang, Ruhan [1 ,2 ]
Jie, Yingmo [1 ,2 ]
Ren, Yizhi [3 ,4 ]
Wu, Ting [3 ]
Choo, Kim-Kwang Raymond [5 ,6 ,7 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian, Peoples R China
[3] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou, Zhejiang, Peoples R China
[4] Hangzhou Dianzi Univ, Minist Educ China, Key Lab Complex Syst Modeling & Simulat, Hangzhou, Zhejiang, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX USA
[6] Univ South Australia, Sch Informat Technol & Math Sci, Adelaide, SA, Australia
[7] China Univ Geosci, Sch Comp Sci, Wuhan, Peoples R China
基金
美国国家科学基金会;
关键词
Searchable encryption; Ciphertext-policy attribute-based encryption; Cloud computing; E-healthcare; Access control;
D O I
10.1007/s10916-016-0588-0
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
An effectively designed e-healthcare system can significantly enhance the quality of access and experience of healthcare users, including facilitating medical and healthcare providers in ensuring a smooth delivery of services. Ensuring the security of patients' electronic health records (EHRs) in the e-healthcare system is an active research area. EHRs may be outsourced to a third-party, such as a community healthcare cloud service provider for storage due to cost-saving measures. Generally, encrypting the EHRs when they are stored in the system (i.e. data-at-rest) or prior to outsourcing the data is used to ensure data confidentiality. Searchable encryption (SE) scheme is a promising technique that can ensure the protection of private information without compromising on performance. In this paper, we propose a novel framework for controlling access to EHRs stored in semi-trusted cloud servers (e.g. a private cloud or a community cloud). To achieve fine-grained access control for EHRs, we leverage the ciphertext-policy attribute-based encryption (CP-ABE) technique to encrypt tables published by hospitals, including patients' EHRs, and the table is stored in the database with the primary key being the patient's unique identity. Our framework can enable different users with different privileges to search on different database fields. Differ from previous attempts to secure outsourcing of data, we emphasize the control of the searches of the fields within the database. We demonstrate the utility of the scheme by evaluating the scheme using datasets from the University of California, Irvine.
引用
收藏
页数:8
相关论文
共 27 条
[11]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[12]  
Choo K.K. R., 2014, ICTs and the Millennium Development Goals, P81, DOI DOI 10.1007/978-1-4899-7439-6_6
[13]  
Choo K.-K. R., 2013, Oxford Handbooks Online, DOI DOI 10.1093/OXFORDHB/9780199730445.013.003
[14]  
Choo KKR, 2011, TRENDS ISS CRIME CRI
[15]   Encryption-Based Solution for Data Sovereignty in Federated Clouds [J].
Esposito, Christian ;
Castiglione, Aniello ;
Choo, Kim-Kwang Raymond .
IEEE CLOUD COMPUTING, 2016, 3 (01) :12-17
[16]   Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing [J].
Fu, Zhangjie ;
Sun, Xingming ;
Liu, Qi ;
Zhou, Lu ;
Shu, Jiangang .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) :190-200
[17]  
Ibraimi Luan., 2009, Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
[18]   Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases [J].
Li, Lichun ;
Lu, Rongxing ;
Choo, Kim-Kwang Raymond ;
Datta, Anwitaman ;
Shao, Jun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) :1847-1861
[19]   An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys [J].
Liu, Ximeng ;
Deng, Robert H. ;
Choo, Kim-Kwang Raymond ;
Weng, Jian .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) :2401-2414
[20]  
Liu Z, 2016, IEEE T DEPEND SECURE, P1