Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems

被引:24
|
作者
Li, Wenchao [1 ]
Jin, Chuanjie [1 ]
Kumari, Saru [2 ]
Xiong, Hu [1 ]
Kumar, Sachin [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu, Peoples R China
[2] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[3] Ajay Kumar Garg Engn Coll, Dept Comp Sci & Engn, Ghaziabad, India
关键词
PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; WIRELESS SENSOR NETWORKS; KEYWORD SEARCH; SCHEME; AUTHENTICATION; INTEGRATION;
D O I
10.1002/ett.3986
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The integration of the Internet of Things (IoT) and cloud computing brings tremendous convenience and efficiency to process and store growing sensor data in healthcare systems. For the security of sensor data collected by healthcare systems, encrypting data before uploading is necessary. Nevertheless, these encrypted form sensor data make it a research challenge to achieve efficient data search and data sharing on the cloud-assisted IoT simultaneously. Encrypting data by public key encryption with equality test (PKE-ET) scheme, identified as a viable solution, is capable to search data encrypted with different keys efficiently. However, how to efficiently share searched healthcare record on the cloud server is still an unsettled problem. To address this problem, we combine the concepts of proxy re-encryption (PRE) and PKE-ET to obtain proxy re-encryption with equality test (PRE-ET). Inheriting the advantages of PKE-ET and PRE, the user can search the required healthcare record data from data encrypted under different public keys. Meanwhile, the searched healthcare record can be shared securely and flexibly without disclosing the secret key and plaintext. We prove the security of our PRE-ET construction based on divisible computation Diffie-Hellman assumption in the random oracle model. Eventually, the proposed scheme is proven useful according to extensive efficiency analysis and comparison.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [2] Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things
    Pei, Hongmei
    Yang, Peng
    Li, Weihao
    Du, Miao
    Hu, Zhongjian
    COMPUTER NETWORKS, 2024, 245
  • [3] Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things
    Wang, Fengqun
    Cui, Jie
    Zhang, Qingyang
    He, Debiao
    Gu, Chengjie
    Zhong, Hong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 14115 - 14126
  • [4] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [5] A Quantum secure sharing protocol for Cloud data based on proxy re-encryption
    Yan Chang
    Shi-Bin Zhang
    Li-Li Yan
    Guo-gen Wan
    Scientific Reports, 10
  • [6] A Quantum secure sharing protocol for Cloud data based on proxy re-encryption
    Chang, Yan
    Zhang, Shi-Bin
    Yan, Li-Li
    Wan, Guo-gen
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [7] Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing
    Manzoor, Ahsan
    Liyanage, Madhsanka
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 99 - 103
  • [8] Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique
    Adilakshmi, Jyothi
    Rithika, Badgoian
    Pushpalatha, Chitikela
    Venkatesh, Thurpati
    Lohitha, Mandapati
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 700 - 705
  • [9] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [10] A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain
    Chen, Yingwen
    Hu, Bowen
    Yu, Hujie
    Duan, Zhimin
    Huang, Junxin
    ELECTRONICS, 2021, 10 (19)