Searchable Encryption for Healthcare Clouds: A Survey

被引:70
|
作者
Zhang, Rui [1 ,2 ]
Xue, Rui [1 ,2 ]
Liu, Ling [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100864, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100190, Peoples R China
[3] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Searchable encryption; healthcare cloud; security; efficiency; conjunctive and expressive keyword search; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; PROXY RE-ENCRYPTION; CONJUNCTIVE KEYWORD SEARCH; PREDICATE ENCRYPTION; PRIVACY;
D O I
10.1109/TSC.2017.2762296
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing medical data and their search services to a third party cloud have been a popular trend for many medical practices, because using healthcare cloud services can help cut down the cost of Electronic Health Records (EHR) systems in terms of front-end ownership cost and IT maintenance burdens. Healthcare cloud applications need searchable encryption with the following two capabilities for protecting data privacy and access privacy: (1) the healthcare providers need to share the encrypted data with authorized users and enable querying over encrypted data, and (2) they also need to keep the query keywords and associated search operations private such that healthcare data hosting service providers cannot gain access to unauthorized content or trace and infer sensitive data stored in the healthcare cloud. This survey paper describes the notion of searchable encryption (SE) in the context of healthcare applications and characterize the SE use cases into four scenarios in healthcare. Then we provide a comprehensive overview of the four representative SE techniques: searchable symmetric encryption (SSE), public key encryption with keyword search (PEKS), attribute-based encryption with keyword search (ABKS), and proxy re-encryption with keyword search (PRES) according to different EHR retrieving scenarios and requirements. We categorize and compare the different SE schemes in terms of their security, efficiency, and functionality. The survey is designed to benefit both experienced researchers in the computer science (CS) field and non-specialists who are domain scientists or healthcare professionals with limited CS and information security background. Thus, we are in favor of technological overview of the state of art searchable encryption models and the underlying key techniques, instead of detailed proofs and constructions of the respective SE algorithms. We describe how the existing SE schemes relate to and differ from one another, and point out the connections between the SE techniques and the security and privacy requirements of healthcare applications and the open research problems.
引用
收藏
页码:978 / 996
页数:19
相关论文
共 50 条
  • [41] Rethinking Searchable Symmetric Encryption
    Gui, Zichen
    Paterson, Kenneth G.
    Patranabis, Sikhar
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1401 - 1418
  • [42] Research on Asymmetric Searchable Encryption
    Yu, Zonghua
    Wu, Yudong
    MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839
  • [43] Deniable Searchable Symmetric Encryption
    Li, Huige
    Zhang, Fangguo
    Fan, Chun-I
    INFORMATION SCIENCES, 2017, 402 : 233 - 243
  • [44] Searchable Encryption through Dispersion
    Aiello Montandon, Carlos
    Vidal Introini, Luis
    Schwarz S. J., Thomas L. E.
    2014 IEEE CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXIV), 2014,
  • [45] Attribute-based searchable encryption with decentralized key management for healthcare data sharing
    Yin, Hongjian
    Zhao, Yiming
    Zhang, Lei
    Qiao, Baojun
    Chen, Wenbo
    Wang, Huaqing
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 148
  • [46] Broadcast Searchable Keyword Encryption
    Ali, Mohamed Ali Hamza
    Zhong, Ting
    Li, Fagen
    Qin, Zhiguan
    Abdelrahaman, Ahmed A. A.
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1010 - 1016
  • [47] Searchable Encryption in the Modern Era
    Curran, Kevin
    2017 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2017,
  • [48] Verifiable dynamic searchable encryption
    Etemad, Mohammad
    Kupcu, Alptekin
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (04) : 2606 - 2623
  • [49] The Locality of Searchable Symmetric Encryption
    Cash, David
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 351 - 368
  • [50] Unconditionally Secure Searchable Encryption
    Yoshizawa, Takahiro
    Watanabe, Yohei
    Shikata, Junji
    2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2017,