Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data

被引:2
作者
Yin, Changchun [1 ]
Wang, Hao [1 ]
Zhou, Lu [1 ]
Fang, Liming [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
来源
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) | 2020年
基金
中国国家自然科学基金;
关键词
Searchable Encryption; Attribute-Based Encryption; Cloud Computing; PUBLIC-KEY ENCRYPTION; SCHEME;
D O I
10.1109/TrustCom50675.2020.00047
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the years, public health has faced a large number of challenges like COVID-19. Medical cloud computing is a promising method since it can make healthcare costs lower. The computation of health data is outsourced to the cloud server. If the encrypted medical data is not decrypted, it is difficult to search for those data. Many researchers have worked on searchable encryption schemes that allow executing searches on encrypted data. However, many existing works support single-keyword search. In this article, we propose a patient-centered fine-grained attribute-based encryption scheme with multi-keyword search (CP-ABEMKS) for medical cloud computing. First, we leverage the ciphertext-policy attribute-based technique to construct trapdoors. Then, we give a security analysis. Besides, we provide a performance evaluation, and the experiments demonstrate the efficiency and practicality of the proposed CP-ABEMKS.
引用
收藏
页码:277 / 284
页数:8
相关论文
共 50 条
  • [31] Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing
    Wang, Qiang
    Peng, Li
    Xiong, Hu
    Sun, Jianfei
    Qin, Zhiguang
    IEEE ACCESS, 2018, 6 : 760 - 771
  • [32] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [33] An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation
    Cui, Yuanbo
    Gao, Fei
    Shi, Yijie
    Yin, Wei
    Panaousis, Emmanouil
    Liang, Kaitai
    IEEE ACCESS, 2020, 8 (08): : 99024 - 99036
  • [34] Extensions to ciphertext-policy attribute-based encryption to support distributed environments
    Servos, Daniel
    Mohammed, Sabah
    Fiaidhi, Jinan
    Kim, Tai Hoon
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2013, 47 (2-3) : 215 - 226
  • [35] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [36] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [37] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu J.
    He X.
    Yan X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [38] Online/offline ciphertext-policy attribute-based searchable encryption
    Chen D.
    Cao Z.
    Dong X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2365 - 2375
  • [39] New Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Zu, Longhui
    Liu, Zhenhua
    Li, Juanjuan
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 281 - 287
  • [40] Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
    Deng, Hua
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    Zhang, Lei
    Liu, Jianwei
    Shi, Wenchang
    INFORMATION SCIENCES, 2014, 275 : 370 - 384