Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud

被引:49
|
作者
Wang, Haijiang [1 ]
Ning, Jianting [2 ,3 ]
Huang, Xinyi [2 ]
Wei, Guiyi [4 ]
Poh, Geong Sen [5 ]
Liu, Ximeng [6 ,7 ]
机构
[1] Zhejiang Univ Sci & Technol, Sch Informat & Elect Engn, Hangzhou 200240, Zhejiang, Peoples R China
[2] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350100, Peoples R China
[3] Natl Univ Singapore, Dept Comp Sci, Singapore 119077, Singapore
[4] Zhejiang Gongshang Univ, Sch Stat & Math, Hangzhou 200240, Zhejiang, Peoples R China
[5] NUS Singtel Cyber Secur R&D Lab, Singapore 119077, Singapore
[6] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
[7] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350001, Peoples R China
基金
中国国家自然科学基金;
关键词
Keyword search; Encryption; Medical services; Cloud computing; Access control; Privacy; E-Healthcare cloud; attribute-based encryption; hidden policy; searchable encryption; keyword search; ATTRIBUTE-BASED ENCRYPTION; TRACEABLE CP-ABE; ATTACKS;
D O I
10.1109/TDSC.2019.2916569
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
E-Healthcare systems are increasingly popular due to the introduction of wearable healthcare devices and sensors. Personal health records (PHRs) are collected by these devices and stored in a remote cloud. Due to privacy concern, these records should not be accessible by any unauthorized party, and the cloud providers should not be able to learn any information from the stored records. To address the above issues, one promising solution is to employ attribute based encryption (ABE) for fine-grained access control and searchable encryption for keyword search on encrypted data. However, most of existing ABE schemes leak the privacy of access policy which may also contain sensitive information. On the other hand, for users' devices with limited computing power and bandwidth, the mechanism should enable them to be able to search the PHRs efficiently. Unfortunately, most existing works on ABE do not support efficient keyword search on encrypted data. In this work, we propose an efficient hidden policy ABE scheme with keyword search. Our scheme enables efficient keyword search with constant computational overhead and constant storage overhead. Moreover, we enhance the recipient's privacy which hides the access policy. As of independent interest, we present a trapdoor malleability attack and demonstrate that some of previous schemes may suffer from such attack.
引用
收藏
页码:1307 / 1319
页数:13
相关论文
共 50 条
  • [41] A Lightweight Fine-Grained Search Scheme over Encrypted Data in Cloud-Assisted Wireless Body Area Networks
    Cao, Mingsheng
    Wang, Luhan
    Qin, Zhiguang
    Lou, Chunwei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019,
  • [42] Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
    Sun, Wenhai
    Yu, Shucheng
    Lou, Wenjing
    Hou, Y. Thomas
    Li, Hui
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (04) : 1187 - 1198
  • [43] Secure conjunctive keyword search over encrypted data
    Golle, P
    Staddon, J
    Waters, B
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 31 - 45
  • [44] Fine-Grained Image Search
    Xie, Lingxi
    Wang, Jingdong
    Zhang, Bo
    Tian, Qi
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2015, 17 (05) : 636 - 647
  • [45] Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing
    Verma, Garima
    Kanrar, Soumen
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (02) : 975 - 996
  • [46] A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
    Xia, Zhihua
    Wang, Xinhui
    Sun, Xingming
    Wang, Qian
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) : 340 - 352
  • [47] Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing
    Garima Verma
    Soumen Kanrar
    [J]. Wireless Personal Communications, 2024, 134 : 975 - 996
  • [48] Secure and privacy-preserving keyword search retrieval over hashed encrypted cloud data
    Sathyabalaji, N.
    Komarasamy, G.
    Raja, Daniel Madan S.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (05)
  • [49] A Secure Multi-Keyword Fuzzy Search with Polynomial Function for Encrypted Data in Cloud Computing
    Liu, I-Hsien
    Lin, Yu-Hsin
    Li, Jung-Shian
    Kuo, Wen-Chung
    Liu, Chuan-Gang
    [J]. PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 41 - 45
  • [50] A robust and lightweight secure access scheme for cloud based E-healthcare services
    Mehedi Masud
    Gurjot Singh Gaba
    Karanjeet Choudhary
    Roobaea Alroobaea
    M. Shamim Hossain
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 3043 - 3057