Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme

被引:17
作者
Yang, Xiaohui [1 ]
Zhang, Chenshuo [1 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071000, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 21期
关键词
IOMT; blockchain; multi-authority attribute encryption; medical data sharing; policy hiding; outsourced decryption; outsourced verification; EFFICIENT;
D O I
10.3390/app122110812
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development of digital healthcare systems by connecting available medical resources and healthcare services. However, there are concerns about the security of sharing patients' electronic health records. In response to the prevailing problems such as difficulties in sharing medical records between different hospitals and patients' inability to grasp the usage of their medical records, we propose a patient-controlled and cloud-chain collaborative multi-authority attribute-based encryption for EHR sharing with verifiable outsourcing decryption and hiding access policies (VO-PH-MAABE). This scheme uses blockchain to store the validation parameters by utilizing its immutable, which data users use to verify the correctness of third-party outsourcing decryption results. In addition, we use policy-hiding technology to protect data privacy so that data security is guaranteed. Moreover, we use blockchain technology to establish trust among multiple authorities and utilize Shamir secret sharing and smart contracts to compute keys or tokens for attributes managed across multiple administrative domains, which avoids a single point of failure and reduces communication and computation overhead on the data user side. Finally, the ciphertext indistinguishability security under the chosen plaintext attack is demonstrated under the stochastic prediction model and compared with other schemes in terms of functionality, communication overhead, and computation overhead. The experimental results show the effectiveness of this scheme.
引用
收藏
页数:19
相关论文
共 30 条
[1]  
[Anonymous], 2013, ACM CCS 2013, DOI DOI 10.1145/2484313.2484381
[2]  
Beimel A., 1996, SECURE SCHEMES SECRE
[3]   Efficient and privacy preserving access control scheme for fog-enabled IoT [J].
Fan, Kai ;
Xu, Huiyue ;
Gao, Longxiang ;
Li, Hui ;
Yang, Yintang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 99 :134-142
[4]  
Gao Junyi, 2022, Application of Intelligent Systems in Multi-modal Information Analytics: The 4th International Conference on Multi-modal Information Analytics (ICMMIA 2022). Lecture Notes on Data Engineering and Communications Technologies (136), P414, DOI 10.1007/978-3-031-05237-8_51
[5]  
Green M., 2011, P USENIX SECURITY S
[6]   O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System [J].
Guo, Rui ;
Yang, Geng ;
Shi, Huixian ;
Zhang, Yinghui ;
Zheng, Dong .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (11) :8949-8963
[7]   A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing [J].
Guo, Rui ;
Zhuang, Chaoyuan ;
Shi, Huixian ;
Zhang, Yinghui ;
Zheng, Dong .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (02)
[8]   Fine-grained data access control with attribute-hiding policy for cloud-based IoT [J].
Hao, Jialu ;
Huang, Cheng ;
Ni, Jianbing ;
Rong, Hong ;
Xian, Ming ;
Shen, Xuemin .
COMPUTER NETWORKS, 2019, 153 :1-10
[9]  
Hoffstein J., 1998, INT ALG NUMB THEOR S, P48
[10]  
Huang D., 2016, U.S. Patent, Patent No. [14/216,202, 14216202]