Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems

被引:11
作者
Li, Wanhua [1 ]
Xu, Lingling [1 ]
Wen, Yamin [4 ]
Zhang, Fangguo [2 ,3 ]
机构
[1] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou, Peoples R China
[2] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou, Peoples R China
[3] Guangdong Prov Key Lab Informat Secur Technol, Guangzhou, Peoples R China
[4] Guangdong Univ Finance & Econ, Sch Stat & Math, Guangzhou, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
EHR; Multi-key; Searchable encryption; Attribute-based; Conjunctive keyword search; KEYWORD SEARCH; PRIVACY; SECURITY;
D O I
10.1016/j.csi.2021.103606
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing demands of online access to health services, multiple medical institutions store their encrypted electronic health records (EHR) on the cloud and share them with the specified doctors and researchers. Multikey searchable encryption (MKSE) is very suitable for this case for the sake of the privacy of patients and the system effeciency. In MKSE, multiple data owners can encrypt the data with their own secret keys and upload them to the remote cloud server. In order to search all the encrypted data on the cloud for a keyword, an authorized user only needs to generate a single trapdoor whose length is independent on the number of the data owners. MKSE allows multiple data owners to share their data with users efficiently. In this paper, we present an efficient MKSE scheme which supports fine-grained access control and conjunctive keyword searches. Both the control policy and keyword expressivity of our scheme are more flexible than the existing MKSE schemes. Meanwhile, our scheme can resist the keyword guessing attack. We will simulate our MKSE scheme and show that it is practical in the real world applications.
引用
收藏
页数:12
相关论文
共 39 条
  • [1] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [2] Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
  • [3] Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
  • [4] Searchable symmetric encryption: Improved definitions and efficient constructions
    Curtmola, Reza
    Garay, Juan
    Kamara, Seny
    Ostrovsky, Rafail
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) : 895 - 934
  • [5] Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
    Fu, Zhangjie
    Wu, Xinle
    Guan, Chaowen
    Sun, Xingming
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2706 - 2716
  • [6] Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
    Fu, Zhangjie
    Sun, Xingming
    Liu, Qi
    Zhou, Lu
    Shu, Jiangang
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) : 190 - 200
  • [7] Ge C., 2021, IEEE T DEPENDABLE SE, VPP, P1
  • [8] A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Huang, Zhiqiu
    Fang, Liming
    Ren, Yongjun
    [J]. COMPUTER JOURNAL, 2016, 59 (07) : 970 - 982
  • [9] Secure conjunctive keyword search over encrypted data
    Golle, P
    Staddon, J
    Waters, B
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 31 - 45
  • [10] Multi-Key Searchable Encryption, Revisited
    Hamlin, Ariel
    Shelat, Abhi
    Weiss, Mor
    Wichs, Daniel
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 95 - 124