Anonymous Electronic Health Record Sharing Scheme Based on Decentralized Hierarchical Attribute-Based Encryption in Cloud Environment

被引:12
作者
Liu, Xueyan [1 ]
Yang, Xiaotao [1 ]
Luo, Yukun [1 ]
Wang, Li [1 ]
Zhang, Qiang [2 ]
机构
[1] Northwest Normal Univ, Coll Math & Stat, Lanzhou 730070, Peoples R China
[2] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
基金
中国国家自然科学基金;
关键词
Electronic medical records; multiple attribute-authority; hierarchical access tree; decentralized; privacy preservation; PROXY RE-ENCRYPTION; MULTI-AUTHORITY; SECURE; ABE;
D O I
10.1109/ACCESS.2020.3035468
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of communication technologies, the network, advanced computing methods and wireless medical sensors gives rise to a modern medical system. In this system, large-scale electronic health records (EHRs) are often outsourced to be stored at the third parties, such as cloud service providers (CSPs). However, CSPs are not trustworthy, that is, serious security and privacy concerns about cloud service exist because it may expose the user's sensitive data to CSPs or unauthorized users in transmission, storage and sharing. To prevent the privacy disclosure of patients better and realize information sharing more effectively, this paper proposes an anonymous EHRs sharing scheme based on decentralized hierarchical attribute-based encryption (ABE). In the proposed scheme, (1) Multiple attribute authority (AA) ABE is leveraged to achieve fine-grained and scalable data access control and avoid bottleneck. Meanwhile, hierarchical access tree is used to encrypt multiple files in one operation, thereby saving calculation and storage load greatly. Moreover, the hidden access policy enhances user privacy protection. (2) The global identifier (GID) of a user is introduced to resist the collusion attack of users. Subsequently, an anonymous key generation mechanism is equipped to prevent multiple AAs from building a full profile using the user's GID. (3) To ensure the correctness and integrity of EHRs, users can conduct double verification based on the verification tag and convergent key. Finally, the efficiency analysis and experiments show that the scheme meets the security requirements of key management and privacy preservation in cloud and is proven secure and efficient in practice under the decisional bilinear Diffie-Hellman (DBDH) assumption.
引用
收藏
页码:200180 / 200193
页数:14
相关论文
共 50 条
[31]   Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing [J].
Xu, Qian ;
Tan, Chengxiang ;
Zhu, Wenye ;
Xiao, Ya ;
Fan, Zhijie ;
Cheng, Fujia .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 :306-326
[32]   Decentralized and expressive data publish-subscribe scheme in cloud based on attribute-based keyword search [J].
Xu, Qian ;
Zhang, Qing ;
Yu, Bo ;
Shi, Nandi ;
Wang, Changshuai ;
He, Wei .
JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 119
[33]   Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain [J].
Zhang, Leyou ;
Zhang, Tianshuai ;
Wu, Qing ;
Mu, Yi ;
Rezaeibagha, Fatemeh .
IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) :12482-12496
[34]   A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare [J].
Dai, Yue ;
Xue, Lulu ;
Yang, Bo ;
Wang, Tao ;
Zhang, Kejia .
COMPUTER STANDARDS & INTERFACES, 2025, 92
[35]   Attribute-Based Encryption Optimized for Cloud Computing [J].
Horvath, Mate .
SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 :566-577
[36]   Attribute-Based Encryption Optimized for Cloud Computing [J].
Horvath, Mate .
INFOCOMMUNICATIONS JOURNAL, 2015, 7 (02) :1-9
[37]   Efficient revocable attribute-based encryption scheme [J].
Li X. ;
Zhang D. ;
Li H. .
Tongxin Xuebao/Journal on Communications, 2019, 40 (06) :32-39
[38]   Comparative Study on Attribute-Based Encryption for Health Records in Cloud Storage [J].
Mhatre, Siddhesh ;
Nimkar, Anant V. ;
Dhage, Sudhir N. .
2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, :647-652
[39]   Data Processing Model in Hierarchical Multi-agent System Based on Decentralized Attribute-Based Encryption [J].
Nyrkov, Andrey ;
Romanova, Yulia ;
Ianiushkin, Konstantin ;
Li, Izolda .
INTERNATIONAL SCIENTIFIC CONFERENCE ENERGY MANAGEMENT OF MUNICIPAL FACILITIES AND SUSTAINABLE ENERGY TECHNOLOGIES, EMMFT 2018, VOL 1, 2020, 982 :429-438
[40]   Hierarchy Attribute-Based Encryption Scheme to Support Direct Revocation in Cloud Storage [J].
Jiang Shuci ;
Guo Weibin ;
Fan Guisheng .
2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, :869-874