Computer Science ›› 2018, Vol. 45 ›› Issue (10): 172-177.doi: 10.11896/j.issn.1002-137X.2018.10.032

• Information Security • Previous Articles     Next Articles

Flexibly Accessed and Vaguely Searchable EHR Cloud Service System

YAN Ming1, ZHANG Ying-hui1,2,3, ZHENG Dong1,2, LV Liu-di1, SU Hao-nan1   

  1. National Engineering Laboratory for Wireless Security,Xi’an University of Posts and Telecommunications,Xi’an 710121,China 1
    Westone Cryptologic Research Center,Beijing 100070,China 2 State Key Laboratory of Cryptology,Beijing 100878,China 3
  • Received:2017-09-11 Online:2018-11-05 Published:2018-11-05

Abstract: In e-healthcare record systems (EHRS),some schemes exploit key-policy ABE (KP-ABE)to protect privacy.An access policy is specified by the user,and the ciphertexts can be decrypted only when they match users’ access plicy.The existing KP-ABE requires that the access policies should be confirmed first during key generation,which is not always practicable in EHRS,because the policies are sometimes confirmed after key generation.Based on KP-ABE,this paper proposed a flexibly accessed and vaguely searchable EHR cloud service system.This system not only fulfills the cloud ciphertext search based on keyword fault-tolerant technique,but also allows users to redefine their access policies and generates keys for the redefined ones,hence,a precise policy is no longer necessary.Finally,the scheme was proved to be secure.

Key words: E-healthcare record, Attribute-based encryption, Access control, Vaguely searchable, Keyword fault tolerant

CLC Number: 

  • TP309
[1]HOHENBERGER S,WATERS B.Attribute-Based Encryption with Fast Decryption[M]∥Public-Key Cryptography-PKC 2013.Springer Berlin Heidelberg,2013:162-179.
[2]ZHANG Y H,ZHENG D,LI J,et al.Attribute directly-revocable attribute-based encryption with constant ciphertext length[J].Journal of Cryptologic Research,2014,1(5):465-480.(in Chinese)
[3]LI S,XU M Z.Attribute-based searchable encryption scheme[J].Chinese Journal of Computers,2014,37(5):1017-1024.(in Chinese)
[4]LI M,YU S,ZHENG Y,et al.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption[J].IEEE Transactions on Parallel & Distri-buted Systems,2012,24(1):131-143.
[5]GOYAL V,JAIN A,PANDEY O,et al.Bounded Ciphertext Policy Attribute Based Encryption[M]∥Automata,Languages and Programming.DBLP,2008:579-591.
[6]WATERS B.Ciphertext-Policy Attribute-Based Encryption:An Expressive,Efficient,and Provably Secure Realization[C]∥Public Key Cryptograpy-PKC 2011.Springer Berlin Heidelberg,2011:53-70.
[7]DENG H,WU Q,QIN B,et al.Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts[J].Information Sciences,2014,275(11):370-384.
[8]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥Proceedings of ACM CCS.2006:89-98.
[9]ROUSELAKIS Y,WATERS B.Practical constructions and new proof methods for large universe attribute-based encryption[C]∥ACM Sigsac Conference on Computer & Communications Security.ACM,2013:463-474.
[10]LEWKO A,WATERS B.Unbounded HIBE and Attribute- Based Encryption[C]∥International Conference on Theory and Applications of Cryptographic Techniques:Advances in Crypto-logy.Springer-Verlag,2011:547-567.
[11]JUNG T,LI X Y,WAN Z,et al.Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption[J].IEEE Transactions on Information Forensics & Security,2014,10(1):190-199.
[12]SUN W,WANG B,CAO N,et al.Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ran-king[J].IEEE Transactions on Parallel & Distributed Systems,2014,25(11):3025-3035.
[13]SUN W,LIU X,LOU W,et al.Catch you if you lie to me:Effi- cient verifiable conjunctive keyword search over large dynamic encrypted cloud data[C]∥IEEE Conference on Proc of the Computer Communications (INFOCOM).IEEE,2015:2110-2118.
[14]YANG B,PANG X Q,DU J Q,et al.Effective Error-Tolerant Keyword Search for Secure Cloud Computing[J].Journal of Computer Science and Technology,2014,29(1):81-89.
[15]WAN Z,LIU J,DENG R H.HASBE:A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing[M].New York:IEEE Press,2012.
[16]LEWKO A,OKAMOTO T,SAHAI A,et al.Fully Secure Functional Encryption:Attribute-Based Encryption and (Hierarchical)Inner Product Encryption[M]∥Advances in Cryptology-EUROCRYPT 2010.Springer Berlin Heidelberg,2010:62-91.
[17]WATERS B.Dual System Encryption:RealizingFully Secure IBE and HIBE under Simple Assumptions[C]∥International Cryptology Conference on Advances in Cryptology.Springer-Verlag,2009:619-636.
[1] WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65.
[2] GU Rong-Jie, WU Zhi-ping and SHI Huan. New Approach for Graded and Classified Cloud Data Access Control for Public Security Based on TFR Model [J]. Computer Science, 2020, 47(6A): 400-403.
[3] PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318.
[4] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[5] SHI Yu-qing, LING Jie. Online/Offline Attribute-based Encryption with User and Attribute Authority Accountability [J]. Computer Science, 2020, 47(4): 292-297.
[6] TU Yuan-fei,ZHANG Cheng-zhen. Secure and Efficient Electronic Health Records for Cloud [J]. Computer Science, 2020, 47(2): 294-299.
[7] QIAO Mao,QIN Ling. AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services [J]. Computer Science, 2019, 46(7): 96-101.
[8] WU Dai-yue, LI Qiang, YU Xiang, HUANG Hai-jun. Client Puzzle Based Access Control Model in Public Blockchain [J]. Computer Science, 2019, 46(4): 129-136.
[9] HUANG Mei-rong, OU Bo, HE Si-yuan. Access Control Method Based on Feature Extraction [J]. Computer Science, 2019, 46(2): 109-114.
[10] LIU Sheng-jie, WANG Jing. Privacy Preserving Scheme for SNS in Cloud Environment [J]. Computer Science, 2019, 46(2): 133-138.
[11] FAN Jian-feng, LI Yi, WU Wen-yuan, FENG Yong. Double Blockchain Based Station Dynamic Loop Information Monitoring System [J]. Computer Science, 2019, 46(12): 155-164.
[12] ZHAO Peng, WU Li-fa, HONG Zheng. Research on Broker Based Multicloud Access Control Model [J]. Computer Science, 2019, 46(11): 123-129.
[13] WANG Jing, SI Shu-jian. Attribute Revocable Access Control Scheme for Brain-Computer Interface Technology [J]. Computer Science, 2018, 45(9): 187-194.
[14] HE Si-yuan, OU Bo, LIAO Xin. Role Matching Access Control Model for Distributed Workflow [J]. Computer Science, 2018, 45(7): 129-134.
[15] LIU Xin-yu, LI Lang, XIAO Bing-bing. Attribute-based Proxy Re-encryption Technology and Fault-tolerant Mechanism Based Data Retrieval Scheme [J]. Computer Science, 2018, 45(7): 162-166.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .