A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud System

被引:12
作者
Lin, Han-Yu [1 ]
Jiang, Yan-Ru [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 01期
关键词
attribute-based encryption; ciphertext policy; medical cloud; keyword search; proxy re-encryption;
D O I
10.3390/app11010063
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Population aging is currently a tough problem of many countries. How to utilize modern technologies (including both information and medical technologies) to improve the service quality of health information is an important issue. Personal Health Record (PHR) could be regarded as a kind of health information records of individuals. A ciphertext policy attribute-based encryption (CP-ABE) is a cryptographic primitive for fine-grained access control of outsourced data in clouds. In order to enable patients to effectively store his medical records and PHR data in medical clouds, we propose an improved multi-user CP-ABE scheme with the functionality of keyword search which enables data users to seek for specific ciphertext in the cloud server by using a specific keyword. Additionally, we adopt an independent proxy server in the proposed system architecture to isolate the communication between clients and the cloud server, so as to prevent cloud servers from suffering direct attacks and also reduce the computational loading of cloud servers. Compared with the previous approach, the proposed encryption algorithm takes less running time and the ciphertext length is also relatively short. Moreover, the procedures of re-encryption and pre-decryption only require one exponentiation computation, respectively.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 30 条
[21]   Personal health record (PHR) in a talisman: An approach to providing continuity of care in developing countries using existing social customs [J].
Srinivasan, Uma ;
Datta, Gora .
HEALTHCOM 2007: UBIQUITOUS HEALTHCARE IN AGING SOCIETIES, 2007, :277-+
[22]  
Taban G., 2006, The Sixth Workshop on Digital Rights Management, P69
[23]  
Talmy A, 2006, 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, P77
[24]  
Wang C., 2013, INT S CYBERSPACE SAF, P377
[25]   Identity Based Proxy Re-encryption Scheme (IBPRE+) for Secure Cloud Data Sharing [J].
Wang, Xu An ;
Xhafa, Fatos ;
Zheng, Zhiheng ;
Nie, Jinting .
2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, :44-48
[26]  
Wei-Kai Yang, 2019, 2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media). Proceedings, P220, DOI 10.1109/Ubi-Media.2019.00050
[27]   A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage [J].
Zeng, Peng ;
Choo, Kim-Kwang Raymond .
IEEE ACCESS, 2018, 6 :70017-70024
[28]   LSSS Matrix-Based Attribute-Based Encryption on Lattices [J].
Zhao, Jian ;
Gao, Haiying .
2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, :253-257
[29]  
Zhou SL, 2020, CHINA COMMUN, V17, P220, DOI 10.23919/JCC.2020.08.018
[30]   Research on an Electronic Medical Record System Based on the Internet [J].
Zhu, Hao ;
Hou, Mengshu .
2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND BUSINESS ANALYTICS (ICDSBA 2018), 2018, :537-540