An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud

被引:12
|
作者
Guo, Rui [1 ,2 ]
Li, Xiong [2 ,3 ]
Zheng, Dong [1 ,4 ]
Zhang, Yinghui [1 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[4] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2020年 / 76卷 / 07期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Attribute-based encryption; Multi-authority; Hierarchical PHR; Cloud computing; PRIVACY PROTECTION; SECURE; AUTHENTICATION;
D O I
10.1007/s11227-018-2644-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the personal health record (PHR) system, the patient's health records are usually outsourced to a large database, such as the cloud service provider. In order to guarantee the confidentiality of this data , achieve access control with flexibility and fine-grained property, it usually employs ciphertext-policy attribute-based encryption (CP-ABE) scheme in cloud computing. However, the outsourced data have the characteristic of multi-level hierarchy, and the general CP-ABE is inappropriate for being applied in distributed cloud service systems directly to provide the security of hierarchy structure of outsourced data. In this paper, to overcome this challenge, a PHR hierarch CP-ABE scheme with multiple authorities is presented. This protocol integrated some different access structures into a single one, which the hierarchical PHR is encrypted based on. There are multiple authorities to generate and distribute user's private key all together. According to this mode, it enables to avoid the problem of key escrow and conform to the distributed characteristic of cloud service systems. However, it has no trusted single or central one in these authorities. Moreover, this proposed scheme resists (N-1) corrupted authorities out of N authorities in the collusion attack. Based on the intractability of the standard decisional bilinear Diffie-Hellman problem, the security of this protocol is proven to be semantic secure. Finally, by comparison analysis, this protocol exhibits a better performance.
引用
收藏
页码:4884 / 4903
页数:20
相关论文
共 50 条
  • [41] Multiple Attribute Authorities Attribute-Based Designated Confirmer Signature Scheme with Unified Verification
    Ren, Yan
    Wang, Guilin
    Hu, Yunhong
    Wang, Qiuyan
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (11): : 2341 - 2348
  • [42] Attribute-Based Encryption Scheme Based on SIFF
    Zhao, Tianyu
    Wei, Lingbo
    Zhang, Chi
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [43] Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems
    Guo, Rui
    Shi, Huixian
    Zhao, Qinglan
    Zheng, Dong
    [J]. IEEE ACCESS, 2018, 6 : 11676 - 11686
  • [44] Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
    Huang, Qinlong
    Yang, Yixian
    Shen, Mansuo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 239 - 249
  • [45] Survey on attribute-based encryption in cloud computing
    Ancy, P.R.
    Krishna, Addapalli V.N.
    Balachandran, K.
    Balamurugan, M.
    Prakasi, O.S. Gnana
    [J]. International Journal of Network Security, 2020, 22 (05): : 863 - 868
  • [46] Attribute-based Encryption in Cloud Computing Environment
    Yan, Yuping
    Kamel, Mohammed B. M.
    Ligeti, Peter
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE, 2020, : 63 - 68
  • [47] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    [J]. INFOCOMMUNICATIONS JOURNAL, 2015, 7 (02): : 1 - 9
  • [48] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    [J]. SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 566 - 577
  • [49] Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage
    Wang, Shangping
    Zhang, Duo
    Zhang, Yaling
    Liu, Lihua
    [J]. IEEE ACCESS, 2018, 6 : 30444 - 30457
  • [50] Secure cloud file sharing scheme using blockchain and attribute-based encryption
    Almasian, Mohammadpayam
    Shafieinejad, Alireza
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 87