Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems

被引:24
|
作者
Li, Wenchao [1 ]
Jin, Chuanjie [1 ]
Kumari, Saru [2 ]
Xiong, Hu [1 ]
Kumar, Sachin [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu, Peoples R China
[2] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[3] Ajay Kumar Garg Engn Coll, Dept Comp Sci & Engn, Ghaziabad, India
关键词
PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; WIRELESS SENSOR NETWORKS; KEYWORD SEARCH; SCHEME; AUTHENTICATION; INTEGRATION;
D O I
10.1002/ett.3986
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The integration of the Internet of Things (IoT) and cloud computing brings tremendous convenience and efficiency to process and store growing sensor data in healthcare systems. For the security of sensor data collected by healthcare systems, encrypting data before uploading is necessary. Nevertheless, these encrypted form sensor data make it a research challenge to achieve efficient data search and data sharing on the cloud-assisted IoT simultaneously. Encrypting data by public key encryption with equality test (PKE-ET) scheme, identified as a viable solution, is capable to search data encrypted with different keys efficiently. However, how to efficiently share searched healthcare record on the cloud server is still an unsettled problem. To address this problem, we combine the concepts of proxy re-encryption (PRE) and PKE-ET to obtain proxy re-encryption with equality test (PRE-ET). Inheriting the advantages of PKE-ET and PRE, the user can search the required healthcare record data from data encrypted under different public keys. Meanwhile, the searched healthcare record can be shared securely and flexibly without disclosing the secret key and plaintext. We prove the security of our PRE-ET construction based on divisible computation Diffie-Hellman assumption in the random oracle model. Eventually, the proposed scheme is proven useful according to extensive efficiency analysis and comparison.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
    Liu, Guijiang
    Xie, Haibo
    Wang, Wenming
    Huang, Haiping
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [42] Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing
    Wang L.-L.
    Chen K.-F.
    Mao X.-P.
    Wang Y.-T.
    Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (19): : 398 - 405
  • [43] A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication
    Shweta Mittal
    Mohona Ghosh
    The Journal of Supercomputing, 2024, 80 : 7955 - 7992
  • [44] A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication
    Mittal, Shweta
    Ghosh, Mohona
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (06): : 7955 - 7992
  • [45] A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid
    Hussain, Saddam
    Ullah, Insaf
    Khattak, Hizbullah
    Adnan, Muhammad
    Kumari, Saru
    Ullah, Syed Sajid
    Khan, Muhammad Asghar
    Khattak, Shah Jahan
    IEEE ACCESS, 2020, 8 (08): : 93230 - 93248
  • [46] Flexible attribute-based proxy re-encryption for efficient data sharing
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Zhou, Yunya
    INFORMATION SCIENCES, 2020, 511 (511) : 94 - 113
  • [47] Blockchain-Based Attribute Proxy Re-Encryption Data Sharing Scheme
    Zhai, Sheping
    Tong, Tong
    Bai, Xifang
    Computer Engineering and Applications, 2023, 59 (08) : 270 - 279
  • [48] Cloud based data sharing with fine-grained proxy re-encryption
    Yang, Yanjiang
    Zhu, Haiyan
    Lu, Haibing
    Weng, Jian
    Zhang, Youcheng
    Choo, Kim-Kwang Raymond
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 122 - 134
  • [49] Towards Secure Data Sharing in Cloud Computing Using Attribute Based Proxy Re-Encryption with Keyword Search
    Hong, Hanshu
    Sun, Zhixin
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 218 - 223
  • [50] Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Zheng, Zhiheng
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 130 : 153 - 165