ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records

被引:21
作者
Xu, Lingling [1 ]
Chen, Xiaofeng [2 ]
Zhang, Fangguo [3 ]
Li, Wanhua [1 ]
Wu, Hao-Tian [1 ]
Tang, Shaohua [1 ,4 ]
Xiang, Yang [5 ]
机构
[1] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Peoples R China
[4] Peng Cheng Lab, Shenzhen 518055, Guangdong, Peoples R China
[5] Swinburne Univ Technol, Digital Res Innovat Capabil Platform, Hawthorn, Vic 3122, Australia
基金
中国国家自然科学基金;
关键词
Keyword search; Cloud computing; Encryption; Access control; Biology; Servers; Personal health records; cloud computing; keyword search; attribute set; recursive set structure; PUBLIC-KEY ENCRYPTION;
D O I
10.1109/TDSC.2020.2970928
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the growth of public demand for online access to health services, many efforts have been devoted to personal health records (PHR) in cloud computing. It enables patients to manage their personal health information (PHI) in cloud servers, which greatly facilitates the collection, access and sharing of PHI. Since cloud servers are not fully trusted, it is desirable that the PHI can be encrypted for privacy protection before uploaded to the cloud. Besides the privacy of PHI, fine-grained and flexible search control is also strongly desired for a secure PHR system. In this article, we first present attribute set based keyword search (ASBKS) which can realize fine-grained keyword search of encrypted PHR. Compared with the existing searchable encryption with access control, the proposed ASBKS can achieve more flexibility in user attributes organization and more efficiency in specifying policies. Furthermore, we present a hierarchical ASBKS scheme to improve scalability by extending ASBKS with a hierarchical structure of users. We implement our ASBKS scheme and the experimental results demonstrate that it is both efficient and flexible for encrypted PHR in cloud computing.
引用
收藏
页码:2941 / 2952
页数:12
相关论文
共 46 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
  • [2] [Anonymous], 2019, Health Insurance Portability and Accountability Act (HIPAA)
  • [3] [Anonymous], 2011, PROC ANN INT CRYPTOL
  • [4] Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
  • [5] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
  • [6] Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
  • [7] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [8] Bobba R, 2009, LECT NOTES COMPUT SC, V5789, P587, DOI 10.1007/978-3-642-04444-1_36
  • [9] Hierarchical identity based encryption with constant size ciphertext
    Boneh, D
    Boyen, X
    Goh, EJ
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
  • [10] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506