Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services

被引:0
作者
Shi, Yang [1 ]
Fan, Hongfei [1 ]
Xiong, Guoyue [2 ]
机构
[1] Tongji Univ, Sch Software Engn, Shanghai 200092, Peoples R China
[2] Tongji Univ, Sch Econ & Management, Shanghai 200092, Peoples R China
基金
中国国家自然科学基金;
关键词
Personal health record services; electronic medical records; privacy-preserving; obfuscator; multi-recipient re-encryption;
D O I
10.3233/THC-150946
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
BACKGROUND: With the rapid development of cloud computing techniques, it is attractive for personal health record (PHR) service providers to deploy their PHR applications and store the personal health data in the cloud. However, there could be a serious privacy leakage if the cloud-based system is intruded by attackers, which makes it necessary for the PHR service provider to encrypt all patients' health data on cloud servers. OBJECTIVE: Existing techniques are insufficiently secure under circumstances where advanced threats are considered, or being inefficient when many recipients are involved. Therefore, the objectives of our solution are (1) providing a secure implementation of re-encryption in white-box attack contexts and (2) assuring the efficiency of the implementation even in multi-recipient cases. METHODS: We designed the multi-recipient re-encryption functionality by randomness-reusing and protecting the implementation by obfuscation. RESULTS: The proposed solution is secure even in white-box attack contexts. Furthermore, a comparison with other related work shows that the computational cost of the proposed solution is lower. CONCLUSIONS: The proposed technique can serve as a building block for supporting secure, efficient and privacy-preserving personal health record service systems.
引用
收藏
页码:S139 / S145
页数:7
相关论文
共 10 条
  • [1] A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds
    Abbas, Assad
    Khan, Samee U.
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) : 1431 - 1441
  • [2] Setting up a telemedicine service for remote real-time video-EEG consultation in La Rioja (Spain)
    Campos, C.
    Caudevilla, E.
    Alesanco, A.
    Lasierra, N.
    Martinez, O.
    Fernandez, J.
    Garcia, J.
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2012, 81 (06) : 404 - 414
  • [3] Chow S, 2002, LECT NOTES COMPUT SC, V2696, P1
  • [4] Constructing pairing-friendly hyperelliptic curves using Weil restriction
    Freeman, David Mandell
    Satoh, Takakazu
    [J]. JOURNAL OF NUMBER THEORY, 2011, 131 (05) : 959 - 983
  • [5] Securely Obfuscating Re-Encryption
    Hohenberger, Susan
    Rothblum, Guy N.
    Shelat, Abhi
    Vaikuntanathan, Vinod
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 694 - 719
  • [6] Securing m-healthcare social networks: Challenges, countermeasures and future directions
    [J]. 1600, Institute of Electrical and Electronics Engineers Inc., United States (20): : 12 - 21
  • [7] Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields
    Lauter, Kristin
    Shang, Ning
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2013, 67 (03) : 341 - 355
  • [8] Successful Implementation of a Telemedicine-Based Counseling Program for High-Risk Patients With Breast Cancer
    Pruthi, Sandhya
    Stange, Kevin J.
    Malagrino, Gerald D., Jr.
    Chawla, Kashmira S.
    LaRusso, Nicholas F.
    Kaur, Judith S.
    [J]. MAYO CLINIC PROCEEDINGS, 2013, 88 (01) : 68 - 73
  • [9] A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts
    Shi, Yang
    Liu, Qin
    Zhao, Qinpei
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [10] US Department of Health & Human Services, 1996, Health insurance portability and accountability act of 1996, DOI DOI 10.1007/978-0-387-70992-5