Searchable Encryption for Healthcare Clouds: A Survey

被引:70
|
作者
Zhang, Rui [1 ,2 ]
Xue, Rui [1 ,2 ]
Liu, Ling [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100864, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100190, Peoples R China
[3] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Searchable encryption; healthcare cloud; security; efficiency; conjunctive and expressive keyword search; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; PROXY RE-ENCRYPTION; CONJUNCTIVE KEYWORD SEARCH; PREDICATE ENCRYPTION; PRIVACY;
D O I
10.1109/TSC.2017.2762296
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing medical data and their search services to a third party cloud have been a popular trend for many medical practices, because using healthcare cloud services can help cut down the cost of Electronic Health Records (EHR) systems in terms of front-end ownership cost and IT maintenance burdens. Healthcare cloud applications need searchable encryption with the following two capabilities for protecting data privacy and access privacy: (1) the healthcare providers need to share the encrypted data with authorized users and enable querying over encrypted data, and (2) they also need to keep the query keywords and associated search operations private such that healthcare data hosting service providers cannot gain access to unauthorized content or trace and infer sensitive data stored in the healthcare cloud. This survey paper describes the notion of searchable encryption (SE) in the context of healthcare applications and characterize the SE use cases into four scenarios in healthcare. Then we provide a comprehensive overview of the four representative SE techniques: searchable symmetric encryption (SSE), public key encryption with keyword search (PEKS), attribute-based encryption with keyword search (ABKS), and proxy re-encryption with keyword search (PRES) according to different EHR retrieving scenarios and requirements. We categorize and compare the different SE schemes in terms of their security, efficiency, and functionality. The survey is designed to benefit both experienced researchers in the computer science (CS) field and non-specialists who are domain scientists or healthcare professionals with limited CS and information security background. Thus, we are in favor of technological overview of the state of art searchable encryption models and the underlying key techniques, instead of detailed proofs and constructions of the respective SE algorithms. We describe how the existing SE schemes relate to and differ from one another, and point out the connections between the SE techniques and the security and privacy requirements of healthcare applications and the open research problems.
引用
收藏
页码:978 / 996
页数:19
相关论文
共 50 条
  • [31] Distributed Searchable Symmetric Encryption
    Bosch, Christoph
    Peter, Andreas
    Leenders, Bram
    Lim, Hoon Wei
    Tang, Qiang
    Wang, Huaxiong
    Hartel, Pieter
    Jonker, Willem
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 330 - 337
  • [32] Searchable Encryption in the Modern Era
    Curran, Kevin
    2017 INTERNATIONAL CONFERENCE ON SOCIAL MEDIA, WEARABLE AND WEB ANALYTICS (SOCIAL MEDIA), 2017,
  • [33] Cloud Architectures for Searchable Encryption
    Bloemer, Johannes
    Loeken, Nils
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [34] Searchable Encryption Through Dispersion
    Aiello, C.
    Vidal, L.
    Schwarz, T.
    IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (05) : 2479 - 2484
  • [35] Lightweight Verification for Searchable Encryption
    Wang, Boyang
    Fan, Xinxin
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 932 - 937
  • [36] Research on Searchable Symmetric Encryption
    Wang Yunling
    Chen Xiaofeng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (10) : 2374 - 2385
  • [37] Searchable Encryption in the Modern Era
    Curran, Kevin
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [38] Searchable Encryption in Apache Cassandra
    Waage, Tim
    Jhajj, Ramaninder Singh
    Wiese, Lena
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 286 - 293
  • [39] Deterministic and efficiently searchable encryption
    Bellare, Mihir
    Boldyreva, Alexandra
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 535 - +
  • [40] Searchable Encryption with Access Control
    Loeken, Nils
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,