Anonymous Electronic Health Record Sharing Scheme Based on Decentralized Hierarchical Attribute-Based Encryption in Cloud Environment

被引:11
|
作者
Liu, Xueyan [1 ]
Yang, Xiaotao [1 ]
Luo, Yukun [1 ]
Wang, Li [1 ]
Zhang, Qiang [2 ]
机构
[1] Northwest Normal Univ, Coll Math & Stat, Lanzhou 730070, Peoples R China
[2] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
基金
中国国家自然科学基金;
关键词
Electronic medical records; multiple attribute-authority; hierarchical access tree; decentralized; privacy preservation; PROXY RE-ENCRYPTION; MULTI-AUTHORITY; SECURE; ABE;
D O I
10.1109/ACCESS.2020.3035468
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of communication technologies, the network, advanced computing methods and wireless medical sensors gives rise to a modern medical system. In this system, large-scale electronic health records (EHRs) are often outsourced to be stored at the third parties, such as cloud service providers (CSPs). However, CSPs are not trustworthy, that is, serious security and privacy concerns about cloud service exist because it may expose the user's sensitive data to CSPs or unauthorized users in transmission, storage and sharing. To prevent the privacy disclosure of patients better and realize information sharing more effectively, this paper proposes an anonymous EHRs sharing scheme based on decentralized hierarchical attribute-based encryption (ABE). In the proposed scheme, (1) Multiple attribute authority (AA) ABE is leveraged to achieve fine-grained and scalable data access control and avoid bottleneck. Meanwhile, hierarchical access tree is used to encrypt multiple files in one operation, thereby saving calculation and storage load greatly. Moreover, the hidden access policy enhances user privacy protection. (2) The global identifier (GID) of a user is introduced to resist the collusion attack of users. Subsequently, an anonymous key generation mechanism is equipped to prevent multiple AAs from building a full profile using the user's GID. (3) To ensure the correctness and integrity of EHRs, users can conduct double verification based on the verification tag and convergent key. Finally, the efficiency analysis and experiments show that the scheme meets the security requirements of key management and privacy preservation in cloud and is proven secure and efficient in practice under the decisional bilinear Diffie-Hellman (DBDH) assumption.
引用
收藏
页码:200180 / 200193
页数:14
相关论文
共 50 条
  • [1] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Xiehua Li
    Yanlong Wang
    Ming Xu
    Yaping Cui
    中国通信, 2018, 15 (02) : 138 - 152
  • [2] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Li, Xiehua
    Wang, Yanlong
    Xu, Ming
    Cui, Yaping
    CHINA COMMUNICATIONS, 2018, 15 (02) : 138 - 152
  • [3] An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud
    Guo, Rui
    Li, Xiong
    Zheng, Dong
    Zhang, Yinghui
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (07) : 4884 - 4903
  • [4] An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud
    Rui Guo
    Xiong Li
    Dong Zheng
    Yinghui Zhang
    The Journal of Supercomputing, 2020, 76 : 4884 - 4903
  • [5] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    COMPUTER JOURNAL, 2016, 59 (08) : 1220 - 1235
  • [6] Attribute-Based Encryption With Blockchain Protection Scheme for Electronic Health Records
    Jiang, Yu
    Xu, Xiaolong
    Xiao, Fu
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04): : 3884 - 3895
  • [7] Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing
    Roy, Sujoy
    Agrawal, Jeet
    Kumar, Alok
    Rao, Udai Pratap
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 6013 - 6038
  • [8] A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
    Fu, Junsong
    Wang, Na
    IEEE ACCESS, 2019, 7 : 36218 - 36232
  • [9] A fully distributed hierarchical attribute-based encryption scheme
    Ali, Mohammad
    Mohajeri, Javad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    THEORETICAL COMPUTER SCIENCE, 2020, 815 : 25 - 46
  • [10] Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
    Chen H.-S.
    Shen Q.-L.
    2018, Beijing University of Posts and Telecommunications (41): : 113 - 118