A Secure Data Sharing Using Identity-Based Encryption Scheme for e-Healthcare System

被引:0
|
作者
Sudarsono, Amang [1 ]
Yuliana, Mike [1 ]
Darwito, Haryadi Amran [1 ]
机构
[1] EEPIS, PENS, Dept Elect Engn, Surabaya, Indonesia
来源
2017 3RD INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH) | 2017年
关键词
e-Healthcare; data sharing; IBE; confidentiality; data integrity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data sharing information regarding health status in the e-healthcare systems becomes one of private and very sensitive information that should be kept from exposure by illegal activities. However, since the information are exchanged across public networks (i.e., Internet and wireless networks), the information become vulnerable. Due to the participating users in the network can not be trusted, a secure data sharing process in the e-healthcare system would be mandatory. In this paper, we propose a secure data sharing in the e-healthcare system using Identity-Based Encryption (IBE) with signature to provide: (1) data sharing can be accessed by only authorized users based on unique public identity (ID) and kept its integrity from alteration during transmission simultaneously, and (2) data sharing are encrypted and authenticated such that the data can only be exchanged by authorized users. Meanwhile, experimental results are able to show the practicality of proposed system.
引用
收藏
页码:429 / 434
页数:6
相关论文
共 50 条
  • [31] Tightly Secure Hierarchical Identity-Based Encryption
    Roman Langrehr
    Jiaxin Pan
    Journal of Cryptology, 2020, 33 : 1787 - 1821
  • [32] Full Secure Identity-based Encryption Scheme over Lattices in the Standard Model
    Wang Jizhong
    Wang Chunxiao
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 412 - 415
  • [33] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption
    Lu, Yang
    Li, Jiguo
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202
  • [34] Identity-based Searchable Encryption Scheme for Encrypted Email System
    Niu Shufen
    Xie Yaya
    Yang Pingping
    Wang Caifen
    Du Xiaoni
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (07) : 1803 - 1810
  • [35] Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system
    Chanchal Maurya
    Vijay Kumar Chaurasiya
    Multimedia Tools and Applications, 2023, 82 : 40443 - 40472
  • [36] A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Chen, Song-Jhih
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [37] Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system
    Maurya, Chanchal
    Chaurasiya, Vijay Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (26) : 40443 - 40472
  • [38] Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
    Huang, Qinlong
    Yue, Wei
    He, Yue
    Yang, Yixian
    IEEE ACCESS, 2018, 6 : 36584 - 36594
  • [39] An Identity-Based and Revocable Data-Sharing Scheme in VANETs
    Horng, Shi-Jinn
    Lu, Cheng-Chung
    Zhou, Wanlei
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) : 15933 - 15946
  • [40] AN IDENTITY-BASED ENCRYPTION SCHEME USING ISOGENY OF ELLIPTIC CURVES
    Bahramian, Mojtaba
    Hajirezaei, Elham
    FACTA UNIVERSITATIS-SERIES MATHEMATICS AND INFORMATICS, 2020, 35 (05): : 1451 - 1460