A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud

被引:22
|
作者
Pussewalage, Harsha Sandaruwan Gardiyawasam [1 ]
Oleshchuk, Vladimir [1 ]
机构
[1] Univ Agder UiA, Dept Informat & Commun Technol, N-4898 Grimstad, Norway
关键词
Cryptography; Hospitals; Cloud computing; Medical services; Encryption; Collaboration; Data privacy; Access control; attribute based encryption; controlled delegation; security; privacy; PROXY RE-ENCRYPTION; IMPROVING PRIVACY; EFFICIENT; SECURITY;
D O I
10.1109/TSC.2022.3174909
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization and growing utilization of electronic health records (EHRs) coupled with the advancements in cloud computing, healthcare providers are interested in storing EHRs in third-party, semi-trusted cloud platforms. Given the collaborative nature of modern e-health environments, integrating access delegation is of paramount importance to strengthen the flexibility of the sharing of health information. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. For such applications, attribute based encryption (ABE) mechanisms are quite useful given the fact that ABE facilitates an efficient way of enforcing secure, fine-grained access control over encrypted data. However, incorporating delegatability with ABE mechanisms is tricky, and the existing schemes lack the control over the process of delegation of encrypted data. As a solution, we propose a novel ABE based access control scheme which can enforce multi-level, controlled access delegation and demonstrated how it could be deployed in an e-health environment to securely share outsourced EHRs of patients. Furthermore, we have shown that the proposed scheme is secure against chosen plaintext attacks as well as attacks mounted via attribute collusion.
引用
收藏
页码:787 / 801
页数:15
相关论文
共 50 条
  • [31] Multibiosignal chaotic encryption scheme based on spread spectrum and global diffusion process for e-health
    Murillo-Escobar, M. A.
    Cruz-Hernandez, C.
    Cardoza-Avendano, L.
    Murillo-Escobar, D.
    Lopez-Gutierrez, R. M.
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2022, 78
  • [32] Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
    Liu, Hongwei
    Zhu, Ping
    Chen, Zehong
    Zhang, Peng
    Jiang, Zoe L.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 556 - 561
  • [33] Privacy Preserving Lightweight Searchable Encryption for Cloud Assisted e-Health System
    Altaf, Fahiem
    Aditia, Mayank
    Saini, Ekta
    Rakshit, Bodhisattwa
    Maity, Soumyadev
    2019 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET 2019): ADVANCING WIRELESS AND MOBILE COMMUNICATIONS TECHNOLOGIES FOR 2020 INFORMATION SOCIETY, 2019, : 310 - 314
  • [34] Traceable Attribute-Based Encryption Scheme Using BIM Collaborative Design
    Liu, Jie
    Xiang, Guangli
    Li, Chengde
    Xie, Weiping
    BUILDINGS, 2024, 14 (03)
  • [35] Data Encryption for E-Health Service
    Djouadi, Karima
    Belkhir, Abdelkader
    6TH INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS, 2022, 393 : 447 - 457
  • [36] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Xiehua Li
    Yanlong Wang
    Ming Xu
    Yaping Cui
    中国通信, 2018, 15 (02) : 138 - 152
  • [37] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Li, Xiehua
    Wang, Yanlong
    Xu, Ming
    Cui, Yaping
    CHINA COMMUNICATIONS, 2018, 15 (02) : 138 - 152
  • [38] An Attribute-Based Searchable Encryption Scheme for Cloud-Assisted IIoT
    Yin, Hui
    Zhang, Wei
    Deng, Hua
    Qin, Zheng
    Li, Keqin
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) : 11014 - 11023
  • [39] Cloud-Assisted Attribute-Based Searchable Encryption Scheme on Blockchain
    Niu S.
    Xie Y.
    Yang P.
    Du X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (04): : 811 - 821
  • [40] Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
    Zhang, Qiuyu
    Zhao, Zhenyu
    Fu, Minrui
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021