Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system

被引:0
|
作者
Chanchal Maurya
Vijay Kumar Chaurasiya
机构
[1] Indian Institute of Information Technology Allahabad,
来源
关键词
IoT; Proxy re-encryption; Blockchain; Mutual authentication; E-healthcare system;
D O I
暂无
中图分类号
学科分类号
摘要
E-healthcare system has been introduced to provide real-time patient health monitoring using IoT sensors and efficiently share patient data with multiple users. Patients need to outsource their health data over the cloud due to the resource-constrained nature of IoT devices and patient devices. While accessing the data from a trusted cloud or distributed users makes health data susceptible and leads to leakage and manipulation. Therefore, we need secure data sharing with fine-grained access control and authentication schemes. The existing proxy re-encryption data sharing schemes use the same key to re-encrypt the patient’s health data more than once, leading to a collusion attack with users. This paper proposes an efficient and collusion-resistant re-encryption scheme (CRRE) with mutual authentication to address the collusion attack that provides privacy-preserving secure data sharing with fine-grained access control. Integrating the CRRE scheme with blockchain provides data integrity, verifiability, accountability, and interoperability between all entities in the e-healthcare system. The random oracle model and AVISPA tool are used to validate the formal and informal security of the CRRE scheme. The proposed scheme is implemented and compared with existing PRE-based schemes on various parameters. The results prove that the proposed CRRE scheme is more efficient and suitable for resource-constrained devices in the e-healthcare system.
引用
收藏
页码:40443 / 40472
页数:29
相关论文
共 50 条
  • [31] A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework
    Yang, Huijie
    Zhou, Tianqi
    Wang, Chen
    He, Debiao
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2021, 2021, 13107 : 374 - 391
  • [32] A Collusion-Resistant Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust
    Melchor, Carlos Aguilar
    Ait-Salem, Boussad
    Gaborit, Philippe
    2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, 2009, : 140 - 147
  • [33] Towards a collusion-resistant algebraic multi-party protocol for privacy-preserving association rule mining in vertically partitioned data
    Trinca, Dragos
    Rajasekaran, Sanguthevar
    2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 402 - +
  • [34] Privacy-Preserving Federated Data Sharing
    Fioretto, Ferdinando
    Van Hentenryck, Pascal
    AAMAS '19: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2019, : 638 - 646
  • [35] Collusion Resistant Multi-Matrix Masking for Privacy-Preserving Data Collection
    Wu, Samuel S.
    Chen, Shigang
    Bhattacharjee, Abhishek
    He, Ying
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 1 - 7
  • [36] Privacy-Preserving Wireless Sensor Networks for E-Healthcare Applications
    Samha, Amani K.
    Alshammri, Ghalib H.
    Pani, Niroj Kumar
    Misra, Yogesh
    Kolluru, Venkata Ratnam
    INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2024,
  • [37] Efficient and Privacy-Preserving Query on Outsourced Spherical Data
    Zhou, Yueyue
    Xiang, Tao
    Li, Xiaoguo
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 138 - 152
  • [38] Practical and Privacy-Preserving Policy Compliance for Outsourced Data
    Di Crescenzo, Giovanni
    Feigenbaum, Joan
    Gupta, Debayan
    Panagos, Euthimios
    Perry, Jason
    Wright, Rebecca N.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 181 - 194
  • [39] Speedy Privacy-Preserving Skyline Queries on Outsourced Data
    Chen, Yu
    Liu, Lin
    Chen, Rongmao
    Fu, Shaojing
    Yang, Yuexiang
    Shi, Jiangyong
    He, Liangzhong
    COMPUTER SECURITY-ESORICS 2024, PT II, 2024, 14983 : 430 - 450
  • [40] Privacy-Preserving Granular Data Retrieval Indexes for Outsourced Cloud Data
    Zhou, Zhigang
    Zhang, Hongli
    Zhang, Qiang
    Xu, Yang
    Li, Panpan
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 601 - 606