Searchable Encryption for Healthcare Clouds: A Survey

被引:71
|
作者
Zhang, Rui [1 ,2 ]
Xue, Rui [1 ,2 ]
Liu, Ling [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100864, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100190, Peoples R China
[3] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Searchable encryption; healthcare cloud; security; efficiency; conjunctive and expressive keyword search; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; PROXY RE-ENCRYPTION; CONJUNCTIVE KEYWORD SEARCH; PREDICATE ENCRYPTION; PRIVACY;
D O I
10.1109/TSC.2017.2762296
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing medical data and their search services to a third party cloud have been a popular trend for many medical practices, because using healthcare cloud services can help cut down the cost of Electronic Health Records (EHR) systems in terms of front-end ownership cost and IT maintenance burdens. Healthcare cloud applications need searchable encryption with the following two capabilities for protecting data privacy and access privacy: (1) the healthcare providers need to share the encrypted data with authorized users and enable querying over encrypted data, and (2) they also need to keep the query keywords and associated search operations private such that healthcare data hosting service providers cannot gain access to unauthorized content or trace and infer sensitive data stored in the healthcare cloud. This survey paper describes the notion of searchable encryption (SE) in the context of healthcare applications and characterize the SE use cases into four scenarios in healthcare. Then we provide a comprehensive overview of the four representative SE techniques: searchable symmetric encryption (SSE), public key encryption with keyword search (PEKS), attribute-based encryption with keyword search (ABKS), and proxy re-encryption with keyword search (PRES) according to different EHR retrieving scenarios and requirements. We categorize and compare the different SE schemes in terms of their security, efficiency, and functionality. The survey is designed to benefit both experienced researchers in the computer science (CS) field and non-specialists who are domain scientists or healthcare professionals with limited CS and information security background. Thus, we are in favor of technological overview of the state of art searchable encryption models and the underlying key techniques, instead of detailed proofs and constructions of the respective SE algorithms. We describe how the existing SE schemes relate to and differ from one another, and point out the connections between the SE techniques and the security and privacy requirements of healthcare applications and the open research problems.
引用
收藏
页码:978 / 996
页数:19
相关论文
共 50 条
  • [1] Searchable encryption : A survey
    Sharma, Dhruti
    INFORMATION SECURITY JOURNAL, 2023, 32 (02): : 76 - 119
  • [2] Survey on the searchable encryption
    Jia, Chun-Fu
    Liu, Zhe-Li
    Li, Jin
    Li, Min
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (01): : 109 - 128
  • [3] A Survey on Searchable Symmetric Encryption
    Li, Feng
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Ximeng
    Ning, Jianting
    Deng, Robert H.
    ACM COMPUTING SURVEYS, 2024, 56 (05)
  • [4] Searchable encryption on the cloud: a survey
    Nitish Andola
    Raghav Gahlot
    Vijay Kumar Yadav
    S. Venkatesan
    Shekhar Verma
    The Journal of Supercomputing, 2022, 78 : 9952 - 9984
  • [5] Searchable Encryption Taxonomy: Survey
    Noorallahzadeh, M. H.
    Alimoradi, R.
    Gholami, A.
    JOURNAL OF APPLIED SECURITY RESEARCH, 2022, : 880 - 924
  • [6] Searchable encryption on the cloud: a survey
    Andola, Nitish
    Gahlot, Raghav
    Yadav, Vijay Kumar
    Venkatesan, S.
    Verma, Shekhar
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (07): : 9952 - 9984
  • [7] A Comparative Survey of Searchable Encryption Schemes
    Pramanick, Neha
    Ali, Syed Taqi
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [8] A Survey of Provably Secure Searchable Encryption
    Bosch, Christoph
    Hartel, Pieter
    Jonker, Willem
    Peter, Andreas
    ACM COMPUTING SURVEYS, 2015, 47 (02)
  • [9] Blockchain-enabled searchable encryption in clouds: A review
    How, Haw-Bin
    Heng, Swee-Huay
    Journal of Information Security and Applications, 2022, 67
  • [10] Blockchain-enabled searchable encryption in clouds: A review
    How, Haw-Bin
    Heng, Swee-Huay
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67