Computer Science ›› 2017, Vol. 44 ›› Issue (Z11): 342-347.doi: 10.11896/j.issn.1002-137X.2017.11A.072

Previous Articles     Next Articles

Attribute-based Searchable Encryption of Electronic Medical Records in Cloud Computing

LI Xiao-rong, SONG Zi-ye, REN Jing-yi, XU Lei and XU Chun-gen   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Electronic medical record is an important product of the medical report under the rapid development of cloud computing technology,whose presence is convenient for the hospitals and patients to manage the medical reports.However,it would be inevitably faced with potential hazards such as the privacy disclosure,illegal access,etc.if the privacy data about patients are stored in the cloud.To protect the privacy of the electronic medical records stored in the cloud,an attribute-based searchable encryption scheme was proposed,and its important application in the electronic medical record system was given.Compared with the traditional searchable encryption scheme,this scheme does not need a secure channel for the trapdoor transmitting,and the difficulties in key management for multiple users could be reduced.Moreover,the scheme can hide the access structure and has fine-grained access control to add and revoke access rights of users according to the request of data owners.Security analysis shows that the scheme can not only protect the privacy of keywords,but also effectively resist the attack of keyword guessing and prevent the private data from leaking out.The keyword-based trapdoor matching algorithm requires only one computation of bilinear pairing,greatly improves the searching efficiency.

Key words: Electronic medical record,Searchable encryption,Fine-grained access control,Attack of keyword guessing

[1] SONG D,WAGNER D,PERRI G.A Practical techniques for searches on encrypted data[C]∥Proceedings of IEEE Symposium on Securityand Privacy.Berkeley,2000:44-55.
[2] BONEH D,CRESCENZO G D,OSTROVSKY R,et al.Publickey encryption with keyword search[C]∥Proceedings of the EUROCRYPT’04.Interlaken,Switzerland,2004:506-522.
[3] GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA,2006:89-98.
[4] BENALOH J,CHASE M,HORVITZ E,et al.Patient Con-trolled Encryption:Ensuring Privacy of Electronic Medical Records[C]∥Proceeding of the ACM Workshop Cloud Computing Security(CCSW’09).2009:103-114.
[5] KULVAIBHAV K,VIJAYARAGHAVAN V,RAJARATHNAMN.Multi-users Attribute Based Searchable Encryption[C]∥Proceeding of International Conference on Mobile Data Management.Milan:IEEE Computer Society,2013:200-205.
[6] 王少辉,韩志杰,肖甫,等.指定测试者的基于身份的可搜索加密方案[J].通信学报,2014,5(7):22-32.
[7] LI J,ZHANG L.Attribute-based keyword search and data access control in cloud[C]∥2014 Tenth International Conference on Computational Intelligence and Security (CIS).IEEE,2014:382-386.
[8] 林鹏,江颉,陈铁明.云环境下关键词搜索加密算法研究[J].通信学报,2015,36(Z1):259-265.
[9] QIU S,LIU J,SHI Y,et al.Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack [J].Science China Information Sciences,2017,60(5):052105.
[10] 刘全明,赵宝,高富强.基于属性的可搜索加密方案[J].山西大学学报(自然科学版),2016,9(4):593-600.
[11] 陈燕俐,杨华山.可支持属性撤销的基于 CP-ABE可搜索加密方案[J].重庆邮电大学学报(自然科学版),2016,8(4):545-554.
[12] 李双,徐茂智.基于属性的可搜索加密方案[J].计算机学报,2014,7(5):1017-1024.
[13] BEIMEL A,et al.Secure schemes for secret sharing and key distribution[R].Technion-Israel Institute of Technology,Faculty of Computer Science,1996.
[14] GENTRY C.Practical identity-based encryption without random oracles[C]∥Annual International Conference on the Theory and Applications of Cryptographic Techniques.Springer Berlin Heidelberg,2006:445-464.
[15] 郭璐璐.对密文查询和基于查询的可搜索加密方案的研究[D].南京:南京理工大学,2014.
[16] 杨旸,林柏钢,马懋德.具有细粒度访问控制的隐藏关键词可搜索加密方案[J].通信学报,2013,4(Z1):92-100.
[17] HAN F,QIN J,ZHAO H,et al.A general transformation from KP-ABE to searchable encryption[J].Future Generation Computer Systems,2014,30:107-115.
[18] BONEH D,BOYEN X.Efficient selective-ID secure identity-based encryption without random oracles[C]∥International Conference on the Theory and Applications of Cryptographic Techniques.Springer Berlin Heidelberg,2004:223-238.
[19] BONEH D,BOYEN X,GOH E J.Hierarchical identity based encryption with constant size ciphertext[C]∥Annual International Conference on the Theory and Applications of Cryptographic Techniques.Springer Berlin Heidelberg,2005:440-456.
[20] BONEH D,GENTRY C,WATERS B.Collusion resistant bro-adcast encryption with short ciphertexts and private keys[C]∥Annual International Cryptology Conference.Springer Berlin Heidelberg,2005:258-275.
[21] BONEH D,KATZ J.Improved efficiency for CCA-secure cryptosystems built using identity-based encryption[C]∥Cryptographers’ Track at the RSA Conference.Springer Berlin Heidelberg,2005:87-103.
[22] 马春光,石岚,汪定.基于访问树的属性基签名算法[J].电子科技大学学报,2013,42(3):410-414.
[23] 李经纬,贾春福,刘哲理.可搜索加密技术研究综述[J].软件学报,2015,26(1):109-128.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!