Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems

被引:24
|
作者
Li, Wenchao [1 ]
Jin, Chuanjie [1 ]
Kumari, Saru [2 ]
Xiong, Hu [1 ]
Kumar, Sachin [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu, Peoples R China
[2] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[3] Ajay Kumar Garg Engn Coll, Dept Comp Sci & Engn, Ghaziabad, India
关键词
PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; WIRELESS SENSOR NETWORKS; KEYWORD SEARCH; SCHEME; AUTHENTICATION; INTEGRATION;
D O I
10.1002/ett.3986
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The integration of the Internet of Things (IoT) and cloud computing brings tremendous convenience and efficiency to process and store growing sensor data in healthcare systems. For the security of sensor data collected by healthcare systems, encrypting data before uploading is necessary. Nevertheless, these encrypted form sensor data make it a research challenge to achieve efficient data search and data sharing on the cloud-assisted IoT simultaneously. Encrypting data by public key encryption with equality test (PKE-ET) scheme, identified as a viable solution, is capable to search data encrypted with different keys efficiently. However, how to efficiently share searched healthcare record on the cloud server is still an unsettled problem. To address this problem, we combine the concepts of proxy re-encryption (PRE) and PKE-ET to obtain proxy re-encryption with equality test (PRE-ET). Inheriting the advantages of PKE-ET and PRE, the user can search the required healthcare record data from data encrypted under different public keys. Meanwhile, the searched healthcare record can be shared securely and flexibly without disclosing the secret key and plaintext. We prove the security of our PRE-ET construction based on divisible computation Diffie-Hellman assumption in the random oracle model. Eventually, the proposed scheme is proven useful according to extensive efficiency analysis and comparison.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing
    Bhatia, Tarunpreet
    Verma, A. K.
    Sharma, Gaurav
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (05):
  • [22] Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud
    Bhatia, Tarunpreet
    Verma, A. K.
    Sharma, Gaurav
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2018, 29 (06):
  • [23] A proxy broadcast re-encryption for cloud data sharing
    Sun, Maosheng
    Ge, Chunpeng
    Fang, Liming
    Wang, Jiandong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 10455 - 10469
  • [24] A proxy broadcast re-encryption for cloud data sharing
    Maosheng Sun
    Chunpeng Ge
    Liming Fang
    Jiandong Wang
    Multimedia Tools and Applications, 2018, 77 : 10455 - 10469
  • [25] Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds
    Xu, Peng
    Xu, Jun
    Wang, Wei
    Jin, Hai
    Susilo, Willy
    Zou, Deqing
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 913 - 918
  • [26] Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
    Chen, Wei-Hao
    Fan, Chun-I
    Tseng, Yi-Fan
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 70 - 73
  • [27] Conditional Proxy Re-Encryption for Secure Big Data Group Sharing in Cloud Environment
    Son, Junggab
    Kim, Donghyun
    Hussain, Rasheed
    Oh, Heekuck
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 541 - 546
  • [28] Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds
    Luo, Fucai
    Wang, Haiyan
    Susilo, Willy
    Yan, Xingfu
    Zheng, Xiaofan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2919 - 2934
  • [29] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Nitish Raghav
    Katyayani Andola
    S. Verma
    Shekhar Venkatesan
    The Journal of Supercomputing, 2023, 79 : 14117 - 14145
  • [30] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Raghav
    Andola, Nitish
    Verma, Katyayani
    Venkatesan, S.
    Verma, Shekhar
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 14117 - 14145