Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data

被引:2
|
作者
Yin, Changchun [1 ]
Wang, Hao [1 ]
Zhou, Lu [1 ]
Fang, Liming [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
来源
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) | 2020年
基金
中国国家自然科学基金;
关键词
Searchable Encryption; Attribute-Based Encryption; Cloud Computing; PUBLIC-KEY ENCRYPTION; SCHEME;
D O I
10.1109/TrustCom50675.2020.00047
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the years, public health has faced a large number of challenges like COVID-19. Medical cloud computing is a promising method since it can make healthcare costs lower. The computation of health data is outsourced to the cloud server. If the encrypted medical data is not decrypted, it is difficult to search for those data. Many researchers have worked on searchable encryption schemes that allow executing searches on encrypted data. However, many existing works support single-keyword search. In this article, we propose a patient-centered fine-grained attribute-based encryption scheme with multi-keyword search (CP-ABEMKS) for medical cloud computing. First, we leverage the ciphertext-policy attribute-based technique to construct trapdoors. Then, we give a security analysis. Besides, we provide a performance evaluation, and the experiments demonstrate the efficiency and practicality of the proposed CP-ABEMKS.
引用
收藏
页码:277 / 284
页数:8
相关论文
共 50 条
  • [21] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Deng, Shijie
    Yang, Gaobo
    Dong, Wen
    Xia, Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22251 - 22274
  • [22] Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
    Shijie Deng
    Gaobo Yang
    Wen Dong
    Ming Xia
    Multimedia Tools and Applications, 2023, 82 : 22251 - 22274
  • [23] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +
  • [24] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
    Zheng, Hua
    Zhang, Xi
    Yang, Qi
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 400 - 411
  • [25] Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
    Yu, Gang
    Wang, Yongjuan
    Cao, Zhenfu
    Lin, Jian
    Wang, Xiangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [26] Astrape: An Efficient Concurrent Cloud Attestation with Ciphertext-Policy Attribute-Based Encryption
    Ba, Haihe
    Zhou, Huaizhe
    Mei, Songzhu
    Qiao, Huidong
    Hong, Tie
    Wang, Zhiying
    Ren, Jiangchun
    SYMMETRY-BASEL, 2018, 10 (10):
  • [27] Multi authority Ciphertext-Policy Attribute-Based encryption for security enhancement in cloud storage unit
    Catherine, V. Reena
    Nargunam, A. Shajin
    SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2022, 53
  • [28] Searchable Ciphertext-Policy Attribute-Based Encryption with Multi-Keywords for Secure Cloud Storage
    Zhao, Zhiyuan
    Sun, Lei
    Li, Zuohui
    Liu, Ying
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018), 2018, : 35 - 41
  • [29] Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing
    Zhang, Leyou
    Gao, Xiaoxu
    Guo, Fuchun
    Hu, Gongcheng
    IEEE ACCESS, 2020, 8 : 94033 - 94042
  • [30] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +