Anonymous Electronic Health Record Sharing Scheme Based on Decentralized Hierarchical Attribute-Based Encryption in Cloud Environment

被引:11
|
作者
Liu, Xueyan [1 ]
Yang, Xiaotao [1 ]
Luo, Yukun [1 ]
Wang, Li [1 ]
Zhang, Qiang [2 ]
机构
[1] Northwest Normal Univ, Coll Math & Stat, Lanzhou 730070, Peoples R China
[2] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
基金
中国国家自然科学基金;
关键词
Electronic medical records; multiple attribute-authority; hierarchical access tree; decentralized; privacy preservation; PROXY RE-ENCRYPTION; MULTI-AUTHORITY; SECURE; ABE;
D O I
10.1109/ACCESS.2020.3035468
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of communication technologies, the network, advanced computing methods and wireless medical sensors gives rise to a modern medical system. In this system, large-scale electronic health records (EHRs) are often outsourced to be stored at the third parties, such as cloud service providers (CSPs). However, CSPs are not trustworthy, that is, serious security and privacy concerns about cloud service exist because it may expose the user's sensitive data to CSPs or unauthorized users in transmission, storage and sharing. To prevent the privacy disclosure of patients better and realize information sharing more effectively, this paper proposes an anonymous EHRs sharing scheme based on decentralized hierarchical attribute-based encryption (ABE). In the proposed scheme, (1) Multiple attribute authority (AA) ABE is leveraged to achieve fine-grained and scalable data access control and avoid bottleneck. Meanwhile, hierarchical access tree is used to encrypt multiple files in one operation, thereby saving calculation and storage load greatly. Moreover, the hidden access policy enhances user privacy protection. (2) The global identifier (GID) of a user is introduced to resist the collusion attack of users. Subsequently, an anonymous key generation mechanism is equipped to prevent multiple AAs from building a full profile using the user's GID. (3) To ensure the correctness and integrity of EHRs, users can conduct double verification based on the verification tag and convergent key. Finally, the efficiency analysis and experiments show that the scheme meets the security requirements of key management and privacy preservation in cloud and is proven secure and efficient in practice under the decisional bilinear Diffie-Hellman (DBDH) assumption.
引用
收藏
页码:200180 / 200193
页数:14
相关论文
共 50 条
  • [31] Protecting data in cloud environment with attribute-based encryption
    Zhu, Shuaishuai
    Yang, Xiaoyuan
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (02) : 91 - 97
  • [32] Attribute-Based Encryption Scheme for Secure Multi-Group Data Sharing in Cloud
    Islam, Md Azharul
    Madria, Sanjay K.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2158 - 2172
  • [33] A Data Sharing Scheme Based on Blockchain System and Attribute-Based Encryption
    Zhang, Xiaodong
    Chen, Taowei
    Feng, Yan
    Yu, Yimin
    2021 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2021, 2021, : 195 - 202
  • [34] Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing
    Roy, Sujoy
    Agrawal, Jeet
    Kumar, Alok
    Rao, Udai Pratap
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 6013 - 6038
  • [35] Security analyses of a data collaboration scheme with hierarchical attribute-based encryption in cloud computing
    Tai, Wei-Liang
    Chang, Ya-Fen
    Huang, Wen-Hsin
    International Journal of Network Security, 2020, 22 (02): : 212 - 217
  • [36] Searchable attribute-based encryption scheme with attribute revocation in cloud storage
    Wang, Shangping
    Zhao, Duqiao
    Zhang, Yaling
    PLOS ONE, 2017, 12 (08):
  • [37] Searchable Attribute-Based Signcryption Scheme for Electronic Personal Health Record
    Liu, Zhenhua
    Liu, Yaohui
    Fan, Yaqing
    IEEE ACCESS, 2018, 6 : 76381 - 76394
  • [38] Power data sharing scheme based on blockchain and attribute-based encryption
    Yang X.
    Liao Z.
    Liu L.
    Wang C.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2023, 51 (13): : 169 - 176
  • [39] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    COMPUTER JOURNAL, 2016, 59 (08): : 1220 - 1235
  • [40] Decentralized Attribute-Based Encryption and Signatures
    Okamoto, Tatsuaki
    Takashima, Katsuyuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 41 - 73