A Secure Data Sharing Using Identity-Based Encryption Scheme for e-Healthcare System

被引:0
|
作者
Sudarsono, Amang [1 ]
Yuliana, Mike [1 ]
Darwito, Haryadi Amran [1 ]
机构
[1] EEPIS, PENS, Dept Elect Engn, Surabaya, Indonesia
来源
2017 3RD INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH) | 2017年
关键词
e-Healthcare; data sharing; IBE; confidentiality; data integrity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data sharing information regarding health status in the e-healthcare systems becomes one of private and very sensitive information that should be kept from exposure by illegal activities. However, since the information are exchanged across public networks (i.e., Internet and wireless networks), the information become vulnerable. Due to the participating users in the network can not be trusted, a secure data sharing process in the e-healthcare system would be mandatory. In this paper, we propose a secure data sharing in the e-healthcare system using Identity-Based Encryption (IBE) with signature to provide: (1) data sharing can be accessed by only authorized users based on unique public identity (ID) and kept its integrity from alteration during transmission simultaneously, and (2) data sharing are encrypted and authenticated such that the data can only be exchanged by authorized users. Meanwhile, experimental results are able to show the practicality of proposed system.
引用
收藏
页码:429 / 434
页数:6
相关论文
共 50 条
  • [21] An identity-based encryption scheme for broadcasting
    Yang, Geng
    Wang, Jiangtao
    Cheng, Hongbing
    Rong, Chunming
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 123 - +
  • [22] Secure pseudonym management using mediated identity-based encryption
    Candebat, Thibault
    Gray, David
    JOURNAL OF COMPUTER SECURITY, 2006, 14 (03) : 249 - 267
  • [23] Flexible attribute-based encryption applicable to secure e-healthcare records
    Bo Qin
    Hua Deng
    Qianhong Wu
    Josep Domingo-Ferrer
    David Naccache
    Yunya Zhou
    International Journal of Information Security, 2015, 14 : 499 - 511
  • [24] Efficient Forward-Secure Identity-Based Encryption Scheme in the Standard Model
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 62 - 69
  • [25] Efficient and secure identity-based encryption scheme with equality test in cloud computing
    Wu, Libing
    Zhang, Yubo
    Choo, Kim-Kwang Raymond
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 22 - 31
  • [26] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075
  • [27] On use of identity-based encryption for secure emailing
    Veigner, Christian
    Rong, Chunming
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 289 - +
  • [28] Tightly Secure Hierarchical Identity-Based Encryption
    Langrehr, Roman
    Pan, Jiaxin
    JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1787 - 1821
  • [29] Secure AIS with Identity-Based Authentication and Encryption
    Goudosis, A.
    Katsikas, S. K.
    TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2020, 14 (02) : 287 - 298
  • [30] Chosen Ciphertext Secure Fuzzy Identity-Based Encryption Scheme With Short Ciphertext
    Shi, Wenbo
    Jang, Injoo
    Yoo, Hyeong Seon
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1036 - 1040