Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing

被引:29
作者
Huang, Qinlong [1 ]
Yue, Wei [1 ]
He, Yue [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Conditional proxy re-encryption; data security; encryption; health information management; profile matching; PROXY RE-ENCRYPTION; PUBLIC-KEY ENCRYPTION; EQUALITY TEST; EFFICIENT;
D O I
10.1109/ACCESS.2018.2852784
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing and social networks are changing the way of healthcare by providing real-time data sharing in a cost-effective manner. However, data security issue is one of the main obstacles to the wide application of mobile healthcare social networks (MHSNs), since health information is considered to be highly sensitive. In this paper, we introduce a secure data sharing and profile matching scheme for the MHSN in cloud computing. The patients can outsource their encrypted health records to cloud storage with an identity-based broadcast encryption technique, and share them with a group of doctors in a secure and efficient manner. We then present an attribute-based conditional data re-encryption construction which permits the doctors who satisfy the pre-defined conditions in the ciphertext to authorize the cloud platform to convert a ciphertext into a new ciphertext of an identity-based encryption scheme for specialist without leaking any sensitive information. Furthermore, we provide a profile matching mechanism in the MHSN based on identity-based encryption with an equality test, which helps patients to find friends in a privacy-preserving way and achieves flexible authorization on the encrypted health records with resisting the keywords guessing attack. Moreover, this mechanism reduces the computation cost on the patient side. The security analysis and experimental evaluation show that our scheme is practical for protecting the data security and privacy in the MHSN.
引用
收藏
页码:36584 / 36594
页数:11
相关论文
共 33 条
[1]   A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds [J].
Abbas, Assad ;
Khan, Samee U. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) :1431-1441
[2]  
[Anonymous], 2018, IEEE T SUSTAIN COMPU
[3]  
[Anonymous], IEEE T DEPENDABLE SE
[4]  
[Anonymous], IEEE T IND INFORM
[5]  
[Anonymous], IEEE T SERVICES COMP
[6]  
[Anonymous], SENSORS
[7]  
[Anonymous], IEEE T CLOUD COMPUT
[8]   ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing [J].
Barua M. ;
Liang X. ;
Lu R. ;
Shen X. .
International Journal of Security and Networks, 2011, 6 (2-3) :67-76
[9]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[10]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122