Towards secure and flexible EHR sharing in mobile health cloud under static assumptions

被引:63
作者
Cai, Zhaoquan [1 ]
Yan, Hongyang [2 ]
Li, Ping [3 ]
Huang, Zheng-an [3 ]
Gao, Chongzhi [4 ]
机构
[1] Huizhou Univ, Sci Res Management Dept, Huizhou, Peoples R China
[2] Nankai Univ, Tianjin, Peoples R China
[3] Guangzhou Univ, Guangzhou, Guangdong, Peoples R China
[4] Guangzhou Univ, Sch Comp Sci, Guangzhou, Guangdong, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2017年 / 20卷 / 03期
基金
中国国家自然科学基金;
关键词
Mobile health; Privacy; Attribute-based encryption; Offline encryption; Outsourcing; ATTRIBUTE-BASED ENCRYPTION; EFFICIENT; ARCHITECTURE; CARE;
D O I
10.1007/s10586-017-0796-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic health record (EHR) systems are promising in the management of individual's health. However, before widely deployed in practical applications, EHR systems have to tackle the privacy and efficiency challenges. Most of existing EHR sharing schemes suffer from severe efficiency drawbacks, resulting in inapplicability in mobile EHR system. Furthermore, the security assumptions in the previous schemes are usually based on non-static assumptions. In this paper, we propose a flexible EHR sharing scheme supporting offline encryption of EHR and outsourced decryption of EHR ciphertexts in mobile cloud computing. The proposed scheme is proven secure in the random oracle model under the static decisional bilinear Diffie-Hellman assumption. In our EHR sharing system, an EHR owner only need one multiplication in bilinear groups to generate the final EHR ciphertexts based on the offline ciphertexts computation, and an EHR user can easily decrypt the EHR cipheretext without requiring bilinear pairing operations based on the transformed ciphertexts from the EHR cloud. Our EHR sharing scheme allows access structures encoded in linear secret sharing schemes. Performance comparisons indicate that our scheme is very suitable for mobile health clouds.
引用
收藏
页码:2415 / 2422
页数:8
相关论文
共 30 条
[1]  
[Anonymous], 2014, J WIRELESS MOBILE NE
[2]  
[Anonymous], 2005, Journal of AHIMA, V76, p64A
[3]  
[Anonymous], ACM C COMP COMM SEC
[4]  
[Anonymous], 2015, Journal of Wireless Mobile Networks, Ubiquitous Computing
[5]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[6]  
[Anonymous], CCS07 P 14 ACM C
[7]  
[Anonymous], LNCS
[8]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[9]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[10]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615