Anonymous Electronic Health Record Sharing Scheme Based on Decentralized Hierarchical Attribute-Based Encryption in Cloud Environment

被引:11
|
作者
Liu, Xueyan [1 ]
Yang, Xiaotao [1 ]
Luo, Yukun [1 ]
Wang, Li [1 ]
Zhang, Qiang [2 ]
机构
[1] Northwest Normal Univ, Coll Math & Stat, Lanzhou 730070, Peoples R China
[2] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
基金
中国国家自然科学基金;
关键词
Electronic medical records; multiple attribute-authority; hierarchical access tree; decentralized; privacy preservation; PROXY RE-ENCRYPTION; MULTI-AUTHORITY; SECURE; ABE;
D O I
10.1109/ACCESS.2020.3035468
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of communication technologies, the network, advanced computing methods and wireless medical sensors gives rise to a modern medical system. In this system, large-scale electronic health records (EHRs) are often outsourced to be stored at the third parties, such as cloud service providers (CSPs). However, CSPs are not trustworthy, that is, serious security and privacy concerns about cloud service exist because it may expose the user's sensitive data to CSPs or unauthorized users in transmission, storage and sharing. To prevent the privacy disclosure of patients better and realize information sharing more effectively, this paper proposes an anonymous EHRs sharing scheme based on decentralized hierarchical attribute-based encryption (ABE). In the proposed scheme, (1) Multiple attribute authority (AA) ABE is leveraged to achieve fine-grained and scalable data access control and avoid bottleneck. Meanwhile, hierarchical access tree is used to encrypt multiple files in one operation, thereby saving calculation and storage load greatly. Moreover, the hidden access policy enhances user privacy protection. (2) The global identifier (GID) of a user is introduced to resist the collusion attack of users. Subsequently, an anonymous key generation mechanism is equipped to prevent multiple AAs from building a full profile using the user's GID. (3) To ensure the correctness and integrity of EHRs, users can conduct double verification based on the verification tag and convergent key. Finally, the efficiency analysis and experiments show that the scheme meets the security requirements of key management and privacy preservation in cloud and is proven secure and efficient in practice under the decisional bilinear Diffie-Hellman (DBDH) assumption.
引用
收藏
页码:200180 / 200193
页数:14
相关论文
共 50 条
  • [21] Secure Sharing of IOT Data in Cloud Environment Using Attribute-Based Encryption
    Kanimozhi, P.
    Victoire, T. Aruldoss Albert
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (06)
  • [22] Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
    Yan, Liang
    Ge, Lina
    Wang, Zhe
    Zhang, Guifen
    Xu, Jingya
    Hu, Zheng
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [23] Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
    Liang Yan
    Lina Ge
    Zhe Wang
    Guifen Zhang
    Jingya Xu
    Zheng Hu
    Journal of Cloud Computing, 12
  • [24] A fully distributed hierarchical attribute-based encryption scheme
    Ali, Mohammad
    Mohajeri, Javad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    THEORETICAL COMPUTER SCIENCE, 2020, 815 : 25 - 46
  • [25] Attribute-Based Encryption With Blockchain Protection Scheme for Electronic Health Records
    Jiang, Yu
    Xu, Xiaolong
    Xiao, Fu
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04): : 3884 - 3895
  • [26] Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
    Chen H.-S.
    Shen Q.-L.
    2018, Beijing University of Posts and Telecommunications (41): : 113 - 118
  • [27] Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    Guo, Minyi
    COMPUTERS & SECURITY, 2011, 30 (05) : 320 - 331
  • [28] An efficient hierarchical attribute-based encryption scheme with cross-domain data sharing
    Yang, Guangcan
    Li, Peixuan
    Xin, Yang
    He, Yunhua
    Wang, Chao
    Chen, Xiubo
    COMPUTER NETWORKS, 2024, 255
  • [29] Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing
    Yan, Hongyang
    Li, Xuan
    Du, Jiali
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 329 - 332
  • [30] Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption
    Fan, Kai
    Huang, Nana
    Wang, Yue
    Li, Hui
    Yang, Yintang
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 111 - 114