Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design

被引:21
作者
Liu, Jianghua [1 ]
Ma, Jinhua [1 ]
Wu, Wei [1 ]
Chen, Xiaofeng [2 ]
Huang, Xinyi [1 ]
Xu, Li [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile health records (MHRs); embedded devices (EDs); cloud computing; online/offline attribute-based signature; ATTRIBUTE-BASED SIGNATURES; PRIVACY; SCHEME;
D O I
10.1145/2983625
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic healthcare (eHealth) systems have replaced traditional paper-based medical systems due to attractive features such as universal accessibility, high accuracy, and low cost. As a major constituent part of eHealth systems, mobile healthcare (mHealth) applies Mobile Internet Devices (MIDs) and Embedded Devices (EDs), such as tablets, smartphones, and other devices embedded in the bodies of individuals, to improve the quality of life and provide more convenient healthcare services for patients. Unfortunately, MIDs and EDs have only limited computational capacity, storage space, and power supply. By taking this into account, we present a new design to guarantee the integrity of eHealth records and the anonymity of the data owner in a more efficient and flexible way. The essence of our design is a general method which can convert any secure Attribute-Based Signature (ABS) scheme into a highly efficient and secure Online/Offline Attribute-Based Signature (OOABS) scheme. We prove the security and analyze the efficiency improvement of the new design. Additionally, we illustrate the proposed generic construction by applying it to a specific ABS scheme.
引用
收藏
页数:20
相关论文
共 55 条
[1]  
[Anonymous], 2008, IACR Cryptol. ePrint Arch.
[2]  
[Anonymous], ADV CRYPTOLOGY EUROC
[3]  
[Anonymous], IMIA YB MED INFORM
[4]  
[Anonymous], 2012, RESEARCH 2 GUIDANCE
[5]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[6]  
Benaloh Josh., 2009, P 2009 ACM WORKSHOP, P103, DOI DOI 10.1145/1655008.1655024
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]  
Boyen X, 2007, LECT NOTES COMPUT SC, V4515, P210
[9]   A trusted versioning file system for passive mobile storage devices [J].
Catuogno, Luigi ;
Loehr, Hans ;
Winandy, Marcel ;
Sadeghi, Ahmad-Reza .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 38 :65-75
[10]  
Catuogno L, 2010, LECT NOTES COMPUT SC, V6163, P156