Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing

被引:3
|
作者
Roy, Sujoy [1 ]
Agrawal, Jeet [1 ]
Kumar, Alok [1 ]
Rao, Udai Pratap [2 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Comp Sci & Engn, Surat 395007, Gujarat, India
[2] Natl Inst Technol Patna, Comp Sci & Engn, Patna 800005, Bihar, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 05期
关键词
Attribute authority (AA); Ciphertext policy-attribute based encryption (CP-ABE); Electronic health records (EHRs); Access structure; Multi-authority; Hierarchical access tree structure; Policy-hiding; Revocation; PROXY RE-ENCRYPTION; ACCESS-CONTROL SCHEME; EFFICIENT; HIDDEN;
D O I
10.1007/s10586-024-04283-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The modern medical system is convergence of cutting-edge technologies and advancements in the healthcare environment. In the modern medical system, the storage of electronic health records is generally leased out to third-party cloud service providers (CSPs). But, CSPs cannot be entirely relied upon due to the potential security and privacy issues. This article presents Multi-Authority and Hierarchical Attribute-Based Encryption Scheme (MH-ABE) scheme to promote secure information sharing and protect patient's privacy. The utilization of CP-ABE in conjunction with multiple Attribute Authorities within the proposed MH-ABE scheme presents a scalable and fine-grained approach to data access control. The proposed MH-ABE scheme incorporates the utilization of a Hierarchical Access Tree to effectively encrypt numerous files concurrently, hence reducing the computational and storage cost. The proposed scheme has also been evaluated using a comparative analysis with existing schemes, emphasizing the assessment of computational and storage costs. The findings of this analysis demonstrate improved performance and efficiency of the proposed ciphertext policy based encryption scheme. The proposed MH-ABE scheme incorporates features such as policy hiding and revocation, and it exhibits resilience against attacks, including collusion resistance, Indistinguishability under chosen-plaintext attack and forward secrecy.
引用
收藏
页码:6013 / 6038
页数:26
相关论文
共 50 条
  • [21] Electronic Health Record Sharing Scheme With Searchable Attribute-Based Encryption on Blockchain
    Niu, Shufen
    Chen, Lixia
    Wang, Jinfeng
    Yu, Fei
    IEEE ACCESS, 2020, 8 : 7195 - 7204
  • [22] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [23] Adaptively secure multi-authority attribute-based broadcast encryption in fog computing
    Chen, Jie
    Niu, Jiaxu
    Lei, Hao
    Lin, Li
    Ling, Yunhao
    COMPUTER NETWORKS, 2023, 232
  • [24] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai ZHANG
    Jianfeng MA
    Jiajia LIU
    Hui LI
    Science China(Information Sciences), 2016, 59 (09) : 256 - 258
  • [25] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai Zhang
    Jianfeng Ma
    Jiajia Liu
    Hui Li
    Science China Information Sciences, 2016, 59
  • [26] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Zhang, Kai
    Ma, Jianfeng
    Liu, Jiajia
    Li, Hui
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (09)
  • [27] Distributed Multi-authority Attribute-Based Encryption for Secure Friend Discovery and Data Sharing in Mobile Social Networks
    Qi, Fang
    Wang, Wenbo
    Tang, Zhe
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 374 - 382
  • [28] Multi-Authority Scheme based CP-ABE with Attribute Revocation for Cloud Data Storage
    Ramesh, Dharavath
    Priya, Rashmi
    2016 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMPUTING AND COMMUNICATIONS (MICROCOM), 2016,
  • [29] Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Wu, Yulin
    Yiu, S. M.
    2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 1003 - 1008
  • [30] Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud
    Kang, Li
    Zhang, Leyou
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 3 - 18