Anonymous Electronic Health Record Sharing Scheme Based on Decentralized Hierarchical Attribute-Based Encryption in Cloud Environment

被引:11
|
作者
Liu, Xueyan [1 ]
Yang, Xiaotao [1 ]
Luo, Yukun [1 ]
Wang, Li [1 ]
Zhang, Qiang [2 ]
机构
[1] Northwest Normal Univ, Coll Math & Stat, Lanzhou 730070, Peoples R China
[2] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
基金
中国国家自然科学基金;
关键词
Electronic medical records; multiple attribute-authority; hierarchical access tree; decentralized; privacy preservation; PROXY RE-ENCRYPTION; MULTI-AUTHORITY; SECURE; ABE;
D O I
10.1109/ACCESS.2020.3035468
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of communication technologies, the network, advanced computing methods and wireless medical sensors gives rise to a modern medical system. In this system, large-scale electronic health records (EHRs) are often outsourced to be stored at the third parties, such as cloud service providers (CSPs). However, CSPs are not trustworthy, that is, serious security and privacy concerns about cloud service exist because it may expose the user's sensitive data to CSPs or unauthorized users in transmission, storage and sharing. To prevent the privacy disclosure of patients better and realize information sharing more effectively, this paper proposes an anonymous EHRs sharing scheme based on decentralized hierarchical attribute-based encryption (ABE). In the proposed scheme, (1) Multiple attribute authority (AA) ABE is leveraged to achieve fine-grained and scalable data access control and avoid bottleneck. Meanwhile, hierarchical access tree is used to encrypt multiple files in one operation, thereby saving calculation and storage load greatly. Moreover, the hidden access policy enhances user privacy protection. (2) The global identifier (GID) of a user is introduced to resist the collusion attack of users. Subsequently, an anonymous key generation mechanism is equipped to prevent multiple AAs from building a full profile using the user's GID. (3) To ensure the correctness and integrity of EHRs, users can conduct double verification based on the verification tag and convergent key. Finally, the efficiency analysis and experiments show that the scheme meets the security requirements of key management and privacy preservation in cloud and is proven secure and efficient in practice under the decisional bilinear Diffie-Hellman (DBDH) assumption.
引用
收藏
页码:200180 / 200193
页数:14
相关论文
共 50 条
  • [41] ASDS: Attribute-based secure data sharing scheme for reliable cloud environment
    Eltayieb, Nabeil
    Wang, Ping
    Hassan, Alzubair
    Elhabob, Rashad
    Li, Fagen
    SECURITY AND PRIVACY, 2019, 2 (02)
  • [42] Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing
    Zhang, Yinghui
    Zheng, Dong
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 807 - 814
  • [43] Anonymous Attribute-Based Searchable Encryption for Smart Health System
    Rajan Mehla
    Ritu Garg
    SN Computer Science, 5 (7)
  • [44] Verifiable attribute-based keyword search encryption with attribute revocation for electronic health record system
    Liu, Zhenhua
    Liu, Yan
    Xu, Jing
    Wang, Baocang
    Liu, Yan (ly10_xidian@163.com), 1600, Femto Technique Co., Ltd. (22): : 845 - 856
  • [45] Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
    Ping Yu
    Qiaoyan Wen
    Wei Ni
    Wenmin Li
    Caijun Sun
    Hua Zhang
    Zhengping Jin
    Wireless Personal Communications, 2019, 106 : 719 - 738
  • [46] Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
    Yu, Ping
    Wen, Qiaoyan
    Ni, Wei
    Li, Wenmin
    Sun, Caijun
    Zhang, Hua
    Jin, Zhengping
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (02) : 719 - 738
  • [47] BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification
    Li, Peiyao
    Cao, Heyang
    Wang, Mingsheng
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [48] Security Analysis of a Decentralized, Revocable and Verifiable Attribute-Based Encryption Scheme
    Prantl, Thomas
    Lauer, Marco
    Horn, Lukas
    Engel, Simon
    Dingel, David
    Kounev, Samuel
    Bauer, Andre
    Krupitzer, Christian
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [49] Decentralized Multi-Authority Attribute-based Searchable Encryption Scheme
    Ren, Juan
    Zhang, Leyou
    Wang, Baocang
    International Journal of Network Security, 2021, 23 (02) : 332 - 342
  • [50] Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation
    Islam, Md Azharul
    Madria, Sanjay
    SECURITY AND PRIVACY, 2024, 7 (01)