Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing

被引:29
|
作者
Huang, Qinlong [1 ]
Yue, Wei [1 ]
He, Yue [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Conditional proxy re-encryption; data security; encryption; health information management; profile matching; PROXY RE-ENCRYPTION; PUBLIC-KEY ENCRYPTION; EQUALITY TEST; EFFICIENT;
D O I
10.1109/ACCESS.2018.2852784
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing and social networks are changing the way of healthcare by providing real-time data sharing in a cost-effective manner. However, data security issue is one of the main obstacles to the wide application of mobile healthcare social networks (MHSNs), since health information is considered to be highly sensitive. In this paper, we introduce a secure data sharing and profile matching scheme for the MHSN in cloud computing. The patients can outsource their encrypted health records to cloud storage with an identity-based broadcast encryption technique, and share them with a group of doctors in a secure and efficient manner. We then present an attribute-based conditional data re-encryption construction which permits the doctors who satisfy the pre-defined conditions in the ciphertext to authorize the cloud platform to convert a ciphertext into a new ciphertext of an identity-based encryption scheme for specialist without leaking any sensitive information. Furthermore, we provide a profile matching mechanism in the MHSN based on identity-based encryption with an equality test, which helps patients to find friends in a privacy-preserving way and achieves flexible authorization on the encrypted health records with resisting the keywords guessing attack. Moreover, this mechanism reduces the computation cost on the patient side. The security analysis and experimental evaluation show that our scheme is practical for protecting the data security and privacy in the MHSN.
引用
收藏
页码:36584 / 36594
页数:11
相关论文
共 50 条
  • [21] Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment
    Karati, Arijit
    Amin, Ruhul
    Islam, S. K. Hafizul
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (01) : 318 - 330
  • [22] Integrity checking protocol with identity-based proxy signature in mobile cloud computing
    Yan, Li
    Shi, Run-Hua
    Zhong, Hong
    Cui, Jie
    Zhang, Shun
    Xu, Yan
    Tongxin Xuebao/Journal on Communications, 2015, 36 (10): : 278 - 286
  • [23] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [24] Identity-based key management for cloud computing
    Zhu, Hong
    Mei, Zhuolin
    Xie, Meiyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2143 - 2156
  • [25] Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing
    Bhatia, Tarunpreet
    Verma, A. K.
    Sharma, Gaurav
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (05):
  • [26] An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
    Meshram, Chandrashekhar
    Lee, Cheng-Chi
    Meshram, Sarita Gajbhiye
    Khan, Muhammad Khurram
    SOFT COMPUTING, 2019, 23 (24) : 13127 - 13138
  • [27] An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
    Chandrashekhar Meshram
    Cheng-Chi Lee
    Sarita Gajbhiye Meshram
    Muhammad Khurram Khan
    Soft Computing, 2019, 23 : 13127 - 13138
  • [28] Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities
    Huang, Qinlong
    Wang, Licheng
    Yang, Yixian
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [29] Identity-based secure data aggregation in big data wireless sensor networks
    Maivizhi, Radhakrishnan
    Yogesh, Palanichamy
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 41 (01) : 16 - 28
  • [30] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571