A Secure Data Sharing Using Identity-Based Encryption Scheme for e-Healthcare System

被引:0
|
作者
Sudarsono, Amang [1 ]
Yuliana, Mike [1 ]
Darwito, Haryadi Amran [1 ]
机构
[1] EEPIS, PENS, Dept Elect Engn, Surabaya, Indonesia
来源
2017 3RD INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH) | 2017年
关键词
e-Healthcare; data sharing; IBE; confidentiality; data integrity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data sharing information regarding health status in the e-healthcare systems becomes one of private and very sensitive information that should be kept from exposure by illegal activities. However, since the information are exchanged across public networks (i.e., Internet and wireless networks), the information become vulnerable. Due to the participating users in the network can not be trusted, a secure data sharing process in the e-healthcare system would be mandatory. In this paper, we propose a secure data sharing in the e-healthcare system using Identity-Based Encryption (IBE) with signature to provide: (1) data sharing can be accessed by only authorized users based on unique public identity (ID) and kept its integrity from alteration during transmission simultaneously, and (2) data sharing are encrypted and authenticated such that the data can only be exchanged by authorized users. Meanwhile, experimental results are able to show the practicality of proposed system.
引用
收藏
页码:429 / 434
页数:6
相关论文
共 50 条
  • [41] A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems
    Chun-Ta Li
    Cheng-Chi Lee
    Chi-Yao Weng
    Song-Jhih Chen
    Journal of Medical Systems, 2016, 40
  • [42] Blockchain-Aided Privacy-Preserving Medical Data Sharing Scheme for E-Healthcare System
    Liu, Jingwei
    Fan, Yue
    Sun, Rong
    Liu, Lei
    Wu, Celimuge
    Mumtaz, Shahid
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24) : 21377 - 21388
  • [43] A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
    Unal, Devrim
    Al-Ali, Abdulla
    Catak, Ferhat Ozgur
    Hammoudeh, Mohammad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 433 - 445
  • [44] A robust and lightweight secure access scheme for cloud based E-healthcare services
    Mehedi Masud
    Gurjot Singh Gaba
    Karanjeet Choudhary
    Roobaea Alroobaea
    M. Shamim Hossain
    Peer-to-Peer Networking and Applications, 2021, 14 : 3043 - 3057
  • [45] A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing
    Hundera, Negalign Wake
    Mei, Qian
    Xiong, Hu
    Geressu, Dagmawit Mesfin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 455 - 472
  • [46] A robust and lightweight secure access scheme for cloud based E-healthcare services
    Masud, Mehedi
    Gaba, Gurjot Singh
    Choudhary, Karanjeet
    Alroobaea, Roobaea
    Hossain, M. Shamim
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 3043 - 3057
  • [47] On Anonymization of Cocks' Identity-based Encryption Scheme
    Nica, Anca-Maria
    Tiplea, Ferucio Laurentiu
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2019, 27 (03) : 283 - 298
  • [48] Improvement on a Fuzzy Identity-based Encryption Scheme
    Zhang, Guoyan
    Wang, Feng
    JOURNAL OF COMPUTERS, 2014, 9 (11) : 2727 - 2732
  • [49] An Identity-Based Encryption Scheme with Compact Ciphertexts
    刘胜利
    郭宝安
    张庆胜
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (01) : 86 - 89
  • [50] Improvement of identity-based encryption scheme and algorithms
    Zheng, Ying
    Bai, Qing-Hai
    Zhao, Lin-Na
    Zhang, Hong-Mei
    Zhang, Yu-Chun
    DESIGN, MANUFACTURING AND MECHATRONICS (ICDMM 2015), 2016, : 482 - 489