FHPT: Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability

被引:4
|
作者
Ying, Zuobin [1 ,2 ]
Si, Yuanping [3 ,4 ]
Ma, Jianfeng [3 ,4 ,5 ]
Liu, Ximeng [6 ]
Xu, Shengmin [7 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230601, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[3] Anhui Univ, Inst Phys, Hefei 230601, Peoples R China
[4] Anhui Univ, Inst Informat Technol, Hefei 230601, Peoples R China
[5] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[6] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[7] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
E-healthcare; EHR; Partial Policy Hiding; Black-box; Fully Secure; ABE;
D O I
10.1109/GLOBECOM42002.2020.9322135
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
E-healthcare cloud remarkably facilitates patients to outsource their electronic health record (EHR) to achieve large-scale information sharing in real-time for improving the efficiency of diagnosis and treatment. Unfortunately, compared with other outsourced data, EHR contains more personal privacy, which makes it more preferred by the adversaries. Besides, in the e-healthcare cloud, there may exist malicious users who deliberately disclose their access privileges to obtain financial benefits. In this paper, we propose a fine-grained EHR sharing scheme in e-healthcare cloud with hidden policy and traceability. Specifically, we present a new black-box traitor tracing scheme based on partial policy hiding attribute-based encryption and it performs fine-grained access control on the encrypted EHR, which not only prevents privacy leakage from access policy but also effectively track malicious users who leak decryption privileges to construct a black-box. Our scheme is proved to be fully secure under the standard model. Performance analysis shows that the scheme can achieve the design goals in terms of storage and computation overhead. In the meantime, it is more efficient than the existing schemes under the composite order group.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A Negotiation Protocol for Fine-Grained Accountable Resource Provisioning and Sharing in e-Science
    Meng, Zeqian
    Brooke, John
    Han, Junyi
    Sakellariou, Rizos
    [J]. JOURNAL OF GRID COMPUTING, 2020, 18 (03) : 471 - 490
  • [32] Decentralized Policy-Hidden Fine-Grained Redaction in Blockchain-Based IoT Systems
    Guo, Hongchen
    Tao, Xiaolong
    Zhao, Mingyang
    Wu, Tong
    Zhang, Chuan
    Xue, Jingfeng
    Zhu, Liehuang
    [J]. SENSORS, 2023, 23 (16)
  • [33] Ubiquitous Cloud Object for Fine-Grained Resource Management in E-Commerce Logistics
    Li, Ming
    Xu, Gangyan
    Shao, Saijun
    Lin, Peng
    Huang, G. Q.
    [J]. TRANSDISCIPLINARY ENGINEERING: A PARADIGM SHIFT, 2017, 5 : 1049 - 1056
  • [34] A Multi-Group-Supporting Policy Hidden Fine-Grained Data Sharing Scheme in 5G-Enabled IoT With Edge Computing
    Cai, Jiayin
    Zhang, Hongjie
    Duo, Zhilin
    Wang, Xuan
    Zhao, Xingwen
    [J]. IEEE ACCESS, 2024, 12 : 46362 - 46378
  • [35] Achieving Searchable and Privacy-Preserving Data Sharing for Cloud-Assisted E-Healthcare System
    Xu, Chang
    Wang, Ningning
    Zhu, Liehuang
    Sharif, Kashif
    Zhang, Chuan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 8345 - 8356
  • [36] Privacy-preserving and fine-grained data sharing for resource-constrained healthcare CPS devices
    Bao, Yangyang
    Qiu, Weidong
    Cheng, Xiaochun
    [J]. EXPERT SYSTEMS, 2023, 40 (06)
  • [37] Fine-grained Access Control Method for Blockchain Data Sharing based on Cloud Platform Big Data
    Qiu, Yu
    Sun, Biying
    Dang, Qian
    Du, Chunhui
    Li, Na
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (10) : 24 - 31
  • [38] Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks
    Jun Zhou
    Zhenfu Cao
    Xiaolei Dong
    [J]. Peer-to-Peer Networking and Applications, 2016, 9 : 774 - 794
  • [39] Secure Time Series Data Sharing with Fine-Grained Access Control in Cloud-Enabled IIoT
    Halder, Subir
    Newe, Thomas
    [J]. PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [40] Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks
    Zhou, Jun
    Cao, Zhenfu
    Dong, Xiaolei
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (04) : 774 - 794