FHPT: Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability

被引:4
|
作者
Ying, Zuobin [1 ,2 ]
Si, Yuanping [3 ,4 ]
Ma, Jianfeng [3 ,4 ,5 ]
Liu, Ximeng [6 ]
Xu, Shengmin [7 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230601, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[3] Anhui Univ, Inst Phys, Hefei 230601, Peoples R China
[4] Anhui Univ, Inst Informat Technol, Hefei 230601, Peoples R China
[5] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[6] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[7] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
E-healthcare; EHR; Partial Policy Hiding; Black-box; Fully Secure; ABE;
D O I
10.1109/GLOBECOM42002.2020.9322135
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
E-healthcare cloud remarkably facilitates patients to outsource their electronic health record (EHR) to achieve large-scale information sharing in real-time for improving the efficiency of diagnosis and treatment. Unfortunately, compared with other outsourced data, EHR contains more personal privacy, which makes it more preferred by the adversaries. Besides, in the e-healthcare cloud, there may exist malicious users who deliberately disclose their access privileges to obtain financial benefits. In this paper, we propose a fine-grained EHR sharing scheme in e-healthcare cloud with hidden policy and traceability. Specifically, we present a new black-box traitor tracing scheme based on partial policy hiding attribute-based encryption and it performs fine-grained access control on the encrypted EHR, which not only prevents privacy leakage from access policy but also effectively track malicious users who leak decryption privileges to construct a black-box. Our scheme is proved to be fully secure under the standard model. Performance analysis shows that the scheme can achieve the design goals in terms of storage and computation overhead. In the meantime, it is more efficient than the existing schemes under the composite order group.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Fine-Grained Access Control via XACML Policy Optimization in Cloud Computing
    Pei, Xin
    Yu, Huiqun
    Fan, Guisheng
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2015, 25 (9-10) : 1709 - 1714
  • [22] Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System
    Bao, Yangyang
    Qiu, Weidong
    Cheng, Xiaochun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2513 - 2526
  • [23] Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage
    Zuo, Cong
    Shao, Jun
    Liu, Joseph K.
    Wei, Guiyi
    Ling, Yun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) : 186 - 196
  • [24] ShareRender: Bypassing GPU Virtualization to Enable Fine-grained Resource Sharing for Cloud Gaming
    Zhang, Wei
    Liao, Xiaofei
    Li, Peng
    Jin, Hai
    Lin, Li
    [J]. PROCEEDINGS OF THE 2017 ACM MULTIMEDIA CONFERENCE (MM'17), 2017, : 324 - 332
  • [25] Towards Scalable, Fine-grained, Intrusion tolerant data protection models for healthcare cloud
    Chen, Lingfeng
    Hoang, Doan B.
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 126 - 133
  • [26] A Blockchain-based Secure Cloud Files Sharing Scheme with Fine-Grained Access Control
    Liu, Yuke
    Zhang, Junwei
    Gao, Qi
    [J]. 2018 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2018, : 277 - 283
  • [27] Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation
    Islam, Md Azharul
    Madria, Sanjay
    [J]. SECURITY AND PRIVACY, 2024, 7 (01):
  • [28] Multi-Authority Fine-Grained Data Sharing and Search Scheme for Cloud Banking Systems
    Mehla, Rajan
    Mamta
    Psannis, Konstantinos
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
  • [29] A Negotiation Protocol for Fine-Grained Accountable Resource Provisioning and Sharing in e-Science
    Zeqian Meng
    John Brooke
    Junyi Han
    Rizos Sakellariou
    [J]. Journal of Grid Computing, 2020, 18 : 471 - 490
  • [30] A Negotiation Protocol for Fine-Grained Accountable Resource Provisioning and Sharing in e-Science
    Meng, Zeqian
    Brooke, John
    Han, Junyi
    Sakellariou, Rizos
    [J]. JOURNAL OF GRID COMPUTING, 2020, 18 (03) : 471 - 490