Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing

被引:29
|
作者
Huang, Qinlong [1 ]
Yue, Wei [1 ]
He, Yue [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Conditional proxy re-encryption; data security; encryption; health information management; profile matching; PROXY RE-ENCRYPTION; PUBLIC-KEY ENCRYPTION; EQUALITY TEST; EFFICIENT;
D O I
10.1109/ACCESS.2018.2852784
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing and social networks are changing the way of healthcare by providing real-time data sharing in a cost-effective manner. However, data security issue is one of the main obstacles to the wide application of mobile healthcare social networks (MHSNs), since health information is considered to be highly sensitive. In this paper, we introduce a secure data sharing and profile matching scheme for the MHSN in cloud computing. The patients can outsource their encrypted health records to cloud storage with an identity-based broadcast encryption technique, and share them with a group of doctors in a secure and efficient manner. We then present an attribute-based conditional data re-encryption construction which permits the doctors who satisfy the pre-defined conditions in the ciphertext to authorize the cloud platform to convert a ciphertext into a new ciphertext of an identity-based encryption scheme for specialist without leaking any sensitive information. Furthermore, we provide a profile matching mechanism in the MHSN based on identity-based encryption with an equality test, which helps patients to find friends in a privacy-preserving way and achieves flexible authorization on the encrypted health records with resisting the keywords guessing attack. Moreover, this mechanism reduces the computation cost on the patient side. The security analysis and experimental evaluation show that our scheme is practical for protecting the data security and privacy in the MHSN.
引用
收藏
页码:36584 / 36594
页数:11
相关论文
共 50 条
  • [31] A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Li, Yuting
    Cheng, Qingfeng
    Liu, Ximeng
    Li, Xinghua
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 935 - 946
  • [32] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    Hema, V. Sri Vigna
    Kesavan, Ramesh
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (02) : 1021 - 1035
  • [33] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    V. Sri Vigna Hema
    Ramesh Kesavan
    Wireless Personal Communications, 2019, 108 : 1021 - 1035
  • [34] A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing
    Li, Haifeng
    Lan, Caihui
    Fu, Xingbing
    Wang, Caifen
    Li, Fagen
    Guo, He
    SENSORS, 2020, 20 (17) : 1 - 17
  • [35] A Secure and Efficient Data Sharing Scheme with Outsourced Signcryption and Decryption in Mobile Cloud Computing
    Fugkeaw, Somchart
    2021 IEEE INTERNATIONAL CONFERENCE ON JOINT CLOUD COMPUTING (JCC 2021) / 2021 9TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2021), 2021, : 72 - 79
  • [36] Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Deng, Robert H.
    Wang, Yujue
    Zhou, Yunya
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3168 - 3180
  • [37] New designed hierarchical computing technique for identity-based signature in the mobile networks
    Wu, Q. (xidianwq@yahoo.com.cn), 1600, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (07):
  • [38] Identity-Based Proxy Signature Multiple-File PDP for Mobile Cloud Computing
    Yuan, Yuan
    Xie, Fu
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 381 - 387
  • [39] Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography
    Guesmi, Houda
    Sadiane, Leila Azouz
    2017 25TH INTERNATIONAL CONFERENCE ON SYSTEMS ENGINEERING (ICSENG), 2017, : 324 - 330
  • [40] Enabling efficient and secure data sharing in cloud computing
    Li, Jingwei
    Li, Jin
    Liu, Zheli
    Jia, Chunfu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1052 - 1066