Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption

被引:166
作者
Liu, Jianghua [1 ,2 ]
Huang, Xinyi [1 ,2 ]
Liu, Joseph K. [3 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[3] Inst Infocomm Res, Infocomm Secur Dept, Singapore, Singapore
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2015年 / 52卷
基金
中国国家自然科学基金;
关键词
Personal Health Records (PHR); Fine-grained access control; Attribute-based signcryption; Cloud computing; IDENTITY-BASED ENCRYPTION;
D O I
10.1016/j.future.2014.10.014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The sharing of Personal Health Records (PHR) in cloud computing is a promising platform of health information exchange. However, the storage of personal medical and health information is usually outsourced to some third parties which may result in the exposure of patients' privacy to unauthorized individuals or organizations. In order to address this security loophole, we suggest a promising solution. We propose a new approach for fine-grained access control and secure sharing of signcrypted (sign-then-encrypt) data. We call our new primitive Ciphertext-Policy Attribute-Based Signcryption (CP-ABSC) which satisfies the requirements of cloud computing scenarios for PHR. CP-ABSC combines the merits of digital signature and encryption to provide confidentiality, authenticity, unforgeability, anonymity and collusion resistance. The correctness, security and efficiency of this scheme are also proven. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:67 / 76
页数:10
相关论文
共 34 条
[1]  
Alshehri S., 2012 IEEE 28 INT C D, P143
[2]  
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[3]  
Benaloh J., P 2009 ACM WORKSH CL, P103
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Brickell E. F., 1991, Journal of Cryptology, V4, P123, DOI 10.1007/BF00196772
[8]  
Emura Keita, 2012, International Journal of Applied Cryptography, V2, P199, DOI 10.1504/IJACT.2012.045589
[9]  
Gagné M, 2010, LECT NOTES COMPUT SC, V6280, P154, DOI 10.1007/978-3-642-15317-4_11
[10]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1