Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design

被引:21
作者
Liu, Jianghua [1 ]
Ma, Jinhua [1 ]
Wu, Wei [1 ]
Chen, Xiaofeng [2 ]
Huang, Xinyi [1 ]
Xu, Li [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile health records (MHRs); embedded devices (EDs); cloud computing; online/offline attribute-based signature; ATTRIBUTE-BASED SIGNATURES; PRIVACY; SCHEME;
D O I
10.1145/2983625
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic healthcare (eHealth) systems have replaced traditional paper-based medical systems due to attractive features such as universal accessibility, high accuracy, and low cost. As a major constituent part of eHealth systems, mobile healthcare (mHealth) applies Mobile Internet Devices (MIDs) and Embedded Devices (EDs), such as tablets, smartphones, and other devices embedded in the bodies of individuals, to improve the quality of life and provide more convenient healthcare services for patients. Unfortunately, MIDs and EDs have only limited computational capacity, storage space, and power supply. By taking this into account, we present a new design to guarantee the integrity of eHealth records and the anonymity of the data owner in a more efficient and flexible way. The essence of our design is a general method which can convert any secure Attribute-Based Signature (ABS) scheme into a highly efficient and secure Online/Offline Attribute-Based Signature (OOABS) scheme. We prove the security and analyze the efficiency improvement of the new design. Additionally, we illustrate the proposed generic construction by applying it to a specific ABS scheme.
引用
收藏
页数:20
相关论文
共 55 条
[41]   Fuzzy identity-based encryption [J].
Sahai, A ;
Waters, B .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :457-473
[42]  
Shahandashti SF, 2009, LECT NOTES COMPUT SC, V5580, P198, DOI 10.1007/978-3-642-02384-2_13
[43]  
Shamir A., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P355
[44]  
Shamir A., 1984, ADV CRYPTOLOGY, P47, DOI 10.1007/3-540-39568-7_5
[45]   ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things [J].
Su, Jinshu ;
Cao, Dan ;
Zhao, Baokang ;
Wang, Xiaofeng ;
You, Ilsun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 33 :11-18
[46]   A Generic Construction of Identity-Based Online/Offline Signcryption [J].
Sun, Dongdong ;
Mu, Yi ;
Susilo, Willy .
PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, 2008, :707-712
[47]   k-anonymity:: A model for protecting privacy [J].
Sweeney, L .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) :557-570
[48]   Mobile e-health: The unwired evolution of telemedicine [J].
Tachakra, S ;
Wang, XH ;
Istepanian, RSH ;
Song, YH .
TELEMEDICINE JOURNAL AND E-HEALTH, 2003, 9 (03) :247-257
[49]   Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability [J].
Tong, Yue ;
Sun, Jinyuan ;
Chow, Sherman S. M. ;
Li, Pan .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (02) :419-429
[50]  
Yang Ming, 2010, 2010 Proceedings of 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC 2010), P126, DOI 10.1109/UIC-ATC.2010.20