Anonymous Electronic Health Record Sharing Scheme Based on Decentralized Hierarchical Attribute-Based Encryption in Cloud Environment

被引:12
作者
Liu, Xueyan [1 ]
Yang, Xiaotao [1 ]
Luo, Yukun [1 ]
Wang, Li [1 ]
Zhang, Qiang [2 ]
机构
[1] Northwest Normal Univ, Coll Math & Stat, Lanzhou 730070, Peoples R China
[2] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
基金
中国国家自然科学基金;
关键词
Electronic medical records; multiple attribute-authority; hierarchical access tree; decentralized; privacy preservation; PROXY RE-ENCRYPTION; MULTI-AUTHORITY; SECURE; ABE;
D O I
10.1109/ACCESS.2020.3035468
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of communication technologies, the network, advanced computing methods and wireless medical sensors gives rise to a modern medical system. In this system, large-scale electronic health records (EHRs) are often outsourced to be stored at the third parties, such as cloud service providers (CSPs). However, CSPs are not trustworthy, that is, serious security and privacy concerns about cloud service exist because it may expose the user's sensitive data to CSPs or unauthorized users in transmission, storage and sharing. To prevent the privacy disclosure of patients better and realize information sharing more effectively, this paper proposes an anonymous EHRs sharing scheme based on decentralized hierarchical attribute-based encryption (ABE). In the proposed scheme, (1) Multiple attribute authority (AA) ABE is leveraged to achieve fine-grained and scalable data access control and avoid bottleneck. Meanwhile, hierarchical access tree is used to encrypt multiple files in one operation, thereby saving calculation and storage load greatly. Moreover, the hidden access policy enhances user privacy protection. (2) The global identifier (GID) of a user is introduced to resist the collusion attack of users. Subsequently, an anonymous key generation mechanism is equipped to prevent multiple AAs from building a full profile using the user's GID. (3) To ensure the correctness and integrity of EHRs, users can conduct double verification based on the verification tag and convergent key. Finally, the efficiency analysis and experiments show that the scheme meets the security requirements of key management and privacy preservation in cloud and is proven secure and efficient in practice under the decisional bilinear Diffie-Hellman (DBDH) assumption.
引用
收藏
页码:200180 / 200193
页数:14
相关论文
共 50 条
[21]   BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification [J].
Li, Peiyao ;
Cao, Heyang ;
Wang, Mingsheng .
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
[22]   Blockchain-Aided Hierarchical Attribute-Based Encryption for Data Sharing [J].
Ding, Jiaxu ;
Yan, Biwei ;
Wang, Guijuan ;
Zhang, Li ;
Han, Yubing ;
Yu, Jiguo ;
Yao, Yan .
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 :364-376
[23]   TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING [J].
Yang, Xiaodong ;
Yang, Ping ;
An, Faying ;
Zhou, Qixu ;
Yang, Miaomiao .
2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, :263-267
[24]   A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme [J].
Feng, Tao ;
Wang, Dewei ;
Gong, Renbin .
INFORMATION, 2023, 14 (05)
[25]   Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [J].
Zarezadeh, Maryam ;
Taluki, Maede Ashouri ;
Siavashi, Mohammad .
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (02) :129-140
[26]   Attribute-based Encryption for Cloud Computing Access Control: A Survey [J].
Zhang, Yinghui ;
Deng, Robert H. ;
Xu, Shengmin ;
Sun, Jianfei ;
Li, Qi ;
Zheng, Dong .
ACM COMPUTING SURVEYS, 2020, 53 (04)
[27]   Anonymous Attribute-Based Conditional Proxy Re-encryption [J].
Mao, Xianping ;
Li, Xuefeng ;
Wu, Xiaochuan ;
Wang, Chuansheng ;
Lai, Junzuo .
NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 :95-110
[28]   An Attribute-Based Searchable Encryption Scheme for Cloud-Assisted IIoT [J].
Yin, Hui ;
Zhang, Wei ;
Deng, Hua ;
Qin, Zheng ;
Li, Keqin .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) :11014-11023
[29]   Accountable specific attribute-based encryption scheme for cloud access control [J].
Nayudu, P. Prathap ;
Sekhar, Krovi Raja .
INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
[30]   Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments [J].
Xie, Chenlu ;
Shi, Run-hua ;
Zhang, Xiaoxu ;
Wang, Pengbo ;
Guo, Wanpeng .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76