Computer Science ›› 2020, Vol. 47 ›› Issue (2): 294-299.doi: 10.11896/jsjkx.181202256

• Information Security • Previous Articles     Next Articles

Secure and Efficient Electronic Health Records for Cloud

TU Yuan-fei,ZHANG Cheng-zhen   

  1. (College of Computer Science and Technology,Nanjing University of Technology,Nanjing 211816,China)
  • Received:2018-12-04 Online:2020-02-15 Published:2020-03-18
  • About author:TU Yuan-fei,born in 1984,doctor of philosophy.His main research interests include the safety and access control of cloud computing;ZHANG Cheng-zhen,born in 1992.His main research interests in clude,the security of information.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61572263, 61272084), Major Natural Science Research Projects in Colleges and University of Jiangsu Province (11KJA520002), Special Research Fund for Doctoral Discipline Points in College and Universities (20113223110003), China Postdoctoral Science Foundation (2015M591794), Jiangsu Postdoctoral Research Grant Scheme (1501023C).

Abstract: With the development and popularty of mobile devices,Electronic Health Record-based BAN is becoming more and more popular.People can back up the medical data acquired by the Body Area Network (BAN) to the cloud,which makes it possible for medical workers to accessed the user’s medical data using mobile terminals almost anywhere.However,for some patients,these medical data are personal privacy and they only wantto be accessed by someone with some rights.This paper proposed an efficient and secure fine-grained access control scheme,which not only enables authorized users to access medical data stored in the cloud,but also supports some privileged doctors to write records.In order to improve effciency of whole system,a method of matching before decryption is added to perform decryption tests without decryption.In addition,this scheme can outsource the bilinear pairing operation to the gateway without leaking the data content so that eliminates the user’s computation overhead.Performance evaluation shows that efficiency of proposed solution in computating,communication and storage has been significantly improved.

Key words: Electronic health record, Body area network, Medical data, Privacy, Access control

CLC Number: 

  • TP309.7
[1]LI M,YU S C,CAO N,et al.Authorized private keyword search over encrypted data in cloud computing[C]∥Proceedings of the 2011 31st International Conference on Distributed Computing Systems.Washington:IEEE Computer Society,2011:383-392.
[2]REZAEIBAGHA F,MU Y.Distributed clinical data sharing via dynamic access-control policy transformation[J].International Journal of Medical Informatics,2016,89(10):25-31.
[3]QIAN H L,LI J G,ZHANG Y C,et al.Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation[J].International Journal of Information Security.2015,14(6):487-497.
[4]AKINYELE J A,LEHMANN C U,GREEN M D,et al.Self-Protecting Electronic Medical Records Using Attribute-Based Encryption[J].Faculty Publications,2010,2011(10):1-20.
[5]LIU X J,XIA Y J,YAN W,et al.Secure and Efficient Querying over Personal Health Records in Cloud Computing[J].Neurocomputing,2018,274(24):99-105.
[6]SAHAI A,WATERS B.Fuzzy identity-based encryption[C]∥Proceedings of the 24th Annual International Conference on the Theory and Application of Cryptographic Techniques.Berlin:Springer,2005:457-473.
[7]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,ACM,2006:89-98.
[8]ZHANG Y H,ZHENG D,DENG R H.Security and Privacy in Smart Health:Efficient Policy-Hiding Attribute-Based Access Control[J].IEEE Internet of Things Journal,2018,5(3):2130-2145.
[9]NARAYAN S,GAGNE M,SAFAVI-NAINI R.Privacy preserving EHR system using attribute-based infrastructure[C]∥Proceedings of the 2010 ACM Conference on Computer and Communications Security.NewYork:ACM,2010:47-52.
[10]XHAFA F,WANG J F,CHEN X F,et al.An efficient PHR service system supporting fuzzy keyword search and fine-grained access control[J].Soft Computing,2014,18(9):1795-1802.
[11]IBRAIMI L,ASIM M,PETKOVIC M.Secure Management of Personal Health Records by Applying Attribute-Based En-cryption[C]∥Proceedings of the 6th International Workshop on Wearable,Micro,and Nano Technologies for Personalized Health.Norway:IEEE,2011:71-74.
[12]AKINYELE J A,PAGANO M W,GREEN M D,et al.Securing electronic medical records using attribute-based encryption on mobile devices[C]∥Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.New York:ACM,2011:75-86.
[13]EOM J,LEE D,LEE K.Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System[J].Journal of Medical System,2016,40(12):253.
[14]LYNN B.Stanford Pairings-Based Crypto Library[OL].http://crypto.stanford.edu/ pbc/.
[15]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]∥Proceedings of the 2007 IEEE Symposium on Security and Privacy.Washington:IEEE,2007:321-334.
[16]WATERS B.Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]∥Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Crytography.Berlin:Springer,2011:53-70.
[17]HHENBERGER S,WATERS B.Attribute-based encryption with fast decryption[J].Public Key Cryptography,2013,7778(10):162-179.
[18]GREEN M,HOHENBERGER S,WATERS B.Outsourcing the Decryption of Abe Ciphertexts[C]∥Proceedings of the 20th USENIX Conference on Security.San Francisco:ACM,2011:34.
[1] YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71.
[2] LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323.
[3] WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65.
[4] GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen. WSN Source-location Privacy Protection Based on Improved Ant Colony Algorithm [J]. Computer Science, 2020, 47(7): 307-313.
[5] GU Rong-Jie, WU Zhi-ping and SHI Huan. New Approach for Graded and Classified Cloud Data Access Control for Public Security Based on TFR Model [J]. Computer Science, 2020, 47(6A): 400-403.
[6] LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551.
[7] PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318.
[8] WANG Mao-ni, PENG Chang-gen, HE Wen-zhu, DING Xing, DING Hong-fa. Privacy Metric Model of Differential Privacy via Graph Theory and Mutual Information [J]. Computer Science, 2020, 47(4): 270-277.
[9] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[10] XU Chong-jian,LI Xian-feng. Data Privacy Protection Method of Block Chain Transaction [J]. Computer Science, 2020, 47(3): 281-286.
[11] ZHAO Nan,ZHANG Guo-an. Authenticated Privacy Protection Scheme Based on Certificateless Ring Signcryption in VANET [J]. Computer Science, 2020, 47(3): 312-319.
[12] LI Yan-bin, LIU Yu, LI Mu-zhou, WU Ren-tao, WANG Peng-da. Participant-adaptive Variant of MASCOT [J]. Computer Science, 2020, 47(11A): 380-387.
[13] XIONG Ling, LI Fa-gen, LIU Zhi-cai. Conditional Privacy-preserving Authentication Scheme Based on Blockchain for Vehicular Ad Hoc Networks [J]. Computer Science, 2020, 47(11): 55-59.
[14] CAI Wei, BAI Guang-wei, SHEN Hang, CHENG Zhao-wei, ZHANG Hui-li. Reinforcement Learning Based Win-Win Game for Mobile Crowdsensing [J]. Computer Science, 2020, 47(10): 41-47.
[15] WU Ying-jie, HUANG Xin, GE Chen, SUN Lan. Adaptive Parameter Optimization for Real-time Differential Privacy Streaming Data Publication [J]. Computer Science, 2019, 46(9): 99-105.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .