Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing

被引:29
|
作者
Huang, Qinlong [1 ]
Yue, Wei [1 ]
He, Yue [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Conditional proxy re-encryption; data security; encryption; health information management; profile matching; PROXY RE-ENCRYPTION; PUBLIC-KEY ENCRYPTION; EQUALITY TEST; EFFICIENT;
D O I
10.1109/ACCESS.2018.2852784
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing and social networks are changing the way of healthcare by providing real-time data sharing in a cost-effective manner. However, data security issue is one of the main obstacles to the wide application of mobile healthcare social networks (MHSNs), since health information is considered to be highly sensitive. In this paper, we introduce a secure data sharing and profile matching scheme for the MHSN in cloud computing. The patients can outsource their encrypted health records to cloud storage with an identity-based broadcast encryption technique, and share them with a group of doctors in a secure and efficient manner. We then present an attribute-based conditional data re-encryption construction which permits the doctors who satisfy the pre-defined conditions in the ciphertext to authorize the cloud platform to convert a ciphertext into a new ciphertext of an identity-based encryption scheme for specialist without leaking any sensitive information. Furthermore, we provide a profile matching mechanism in the MHSN based on identity-based encryption with an equality test, which helps patients to find friends in a privacy-preserving way and achieves flexible authorization on the encrypted health records with resisting the keywords guessing attack. Moreover, this mechanism reduces the computation cost on the patient side. The security analysis and experimental evaluation show that our scheme is practical for protecting the data security and privacy in the MHSN.
引用
收藏
页码:36584 / 36594
页数:11
相关论文
共 50 条
  • [1] A Secure Identity-Based Dynamic Group Data Sharing Scheme for Cloud Computing
    Shen, Jian
    Liu, Dengzhi
    Lai, Chin-Feng
    Ren, Yongjun
    Sun, Xingming
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 833 - 842
  • [2] Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (04) : 1136 - 1148
  • [3] A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing
    Hundera, Negalign Wake
    Mei, Qian
    Xiong, Hu
    Geressu, Dagmawit Mesfin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 455 - 472
  • [4] Comments on "Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption"
    Lee, Kwangsu
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (04) : 1299 - 1300
  • [5] Genuine and Secure Identity-Based Public Audit for the Stored Data in Healthcare Cloud
    Zhang, Jianhong
    Sun, Zhibin
    Mao, Jian
    JOURNAL OF HEALTHCARE ENGINEERING, 2018, 2018
  • [6] Identity-based data storage in cloud computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 673 - 681
  • [7] A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
    Li, Ruixuan
    Shen, Chenglin
    He, Heng
    Gu, Xiwu
    Xu, Zhiyong
    Xu, Cheng-Zhong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 344 - 357
  • [8] Constructing secure-channel free identity-based encryption with equality test for vehicle-data sharing in cloud computing
    Vaanchig, Nyamsuren
    Qin, Zhiguang
    Ragchaasuren, Batjargal
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (05)
  • [9] A Secure Data Sharing Using Identity-Based Encryption Scheme for e-Healthcare System
    Sudarsono, Amang
    Yuliana, Mike
    Darwito, Haryadi Amran
    2017 3RD INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH), 2017, : 429 - 434
  • [10] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072