Computer Science ›› 2018, Vol. 45 ›› Issue (10): 172-177.doi: 10.11896/j.issn.1002-137X.2018.10.032

• Information Security • Previous Articles     Next Articles

Flexibly Accessed and Vaguely Searchable EHR Cloud Service System

YAN Ming1, ZHANG Ying-hui1,2,3, ZHENG Dong1,2, LV Liu-di1, SU Hao-nan1   

  1. National Engineering Laboratory for Wireless Security,Xi’an University of Posts and Telecommunications,Xi’an 710121,China 1
    Westone Cryptologic Research Center,Beijing 100070,China 2 State Key Laboratory of Cryptology,Beijing 100878,China 3
  • Received:2017-09-11 Online:2018-11-05 Published:2018-11-05

Abstract: In e-healthcare record systems (EHRS),some schemes exploit key-policy ABE (KP-ABE)to protect privacy.An access policy is specified by the user,and the ciphertexts can be decrypted only when they match users’ access plicy.The existing KP-ABE requires that the access policies should be confirmed first during key generation,which is not always practicable in EHRS,because the policies are sometimes confirmed after key generation.Based on KP-ABE,this paper proposed a flexibly accessed and vaguely searchable EHR cloud service system.This system not only fulfills the cloud ciphertext search based on keyword fault-tolerant technique,but also allows users to redefine their access policies and generates keys for the redefined ones,hence,a precise policy is no longer necessary.Finally,the scheme was proved to be secure.

Key words: Access control, Attribute-based encryption, E-healthcare record, Keyword fault tolerant, Vaguely searchable

CLC Number: 

  • TP309
[1]HOHENBERGER S,WATERS B.Attribute-Based Encryption with Fast Decryption[M]∥Public-Key Cryptography-PKC 2013.Springer Berlin Heidelberg,2013:162-179.
[2]ZHANG Y H,ZHENG D,LI J,et al.Attribute directly-revocable attribute-based encryption with constant ciphertext length[J].Journal of Cryptologic Research,2014,1(5):465-480.(in Chinese)
张应辉,郑东,李进,等.密文长度恒定且属性直接可撤销的基于属性的加密[J].密码学报,2014,1(5):465-480.
[3]LI S,XU M Z.Attribute-based searchable encryption scheme[J].Chinese Journal of Computers,2014,37(5):1017-1024.(in Chinese)
李双,徐茂智.基于属性的可搜索加密方案[J].计算机学报,2014,37(5):1017-1024.
[4]LI M,YU S,ZHENG Y,et al.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption[J].IEEE Transactions on Parallel & Distri-buted Systems,2012,24(1):131-143.
[5]GOYAL V,JAIN A,PANDEY O,et al.Bounded Ciphertext Policy Attribute Based Encryption[M]∥Automata,Languages and Programming.DBLP,2008:579-591.
[6]WATERS B.Ciphertext-Policy Attribute-Based Encryption:An Expressive,Efficient,and Provably Secure Realization[C]∥Public Key Cryptograpy-PKC 2011.Springer Berlin Heidelberg,2011:53-70.
[7]DENG H,WU Q,QIN B,et al.Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts[J].Information Sciences,2014,275(11):370-384.
[8]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥Proceedings of ACM CCS.2006:89-98.
[9]ROUSELAKIS Y,WATERS B.Practical constructions and new proof methods for large universe attribute-based encryption[C]∥ACM Sigsac Conference on Computer & Communications Security.ACM,2013:463-474.
[10]LEWKO A,WATERS B.Unbounded HIBE and Attribute- Based Encryption[C]∥International Conference on Theory and Applications of Cryptographic Techniques:Advances in Crypto-logy.Springer-Verlag,2011:547-567.
[11]JUNG T,LI X Y,WAN Z,et al.Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption[J].IEEE Transactions on Information Forensics & Security,2014,10(1):190-199.
[12]SUN W,WANG B,CAO N,et al.Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ran-king[J].IEEE Transactions on Parallel & Distributed Systems,2014,25(11):3025-3035.
[13]SUN W,LIU X,LOU W,et al.Catch you if you lie to me:Effi- cient verifiable conjunctive keyword search over large dynamic encrypted cloud data[C]∥IEEE Conference on Proc of the Computer Communications (INFOCOM).IEEE,2015:2110-2118.
[14]YANG B,PANG X Q,DU J Q,et al.Effective Error-Tolerant Keyword Search for Secure Cloud Computing[J].Journal of Computer Science and Technology,2014,29(1):81-89.
[15]WAN Z,LIU J,DENG R H.HASBE:A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing[M].New York:IEEE Press,2012.
[16]LEWKO A,OKAMOTO T,SAHAI A,et al.Fully Secure Functional Encryption:Attribute-Based Encryption and (Hierarchical)Inner Product Encryption[M]∥Advances in Cryptology-EUROCRYPT 2010.Springer Berlin Heidelberg,2010:62-91.
[17]WATERS B.Dual System Encryption:RealizingFully Secure IBE and HIBE under Simple Assumptions[C]∥International Cryptology Conference on Advances in Cryptology.Springer-Verlag,2009:619-636.
[1] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[2] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[3] GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di. Blockchain-based Role-Delegation Access Control for Industrial Control System [J]. Computer Science, 2021, 48(9): 306-316.
[4] CHENG Xue-lin, YANG Xiao-hu, ZHUO Chong-kui. Research and Implementation of Data Authority Control Model Based on Organization [J]. Computer Science, 2021, 48(6A): 558-562.
[5] PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319.
[6] CAO Meng, YU Yang, LIANG Ying, SHI Hong-zhou. Key Technologies and Development Trends of Big Data Trade Based on Blockchain [J]. Computer Science, 2021, 48(11A): 184-190.
[7] HE Heng, JIANG Jun-jun, FENG Ke, LI Peng, XU Fang-fang. Efficient Multi-keyword Retrieval Scheme Based on Attribute Encryption in Multi-cloud Environment [J]. Computer Science, 2021, 48(11A): 576-584.
[8] XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115.
[9] WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65.
[10] GU Rong-Jie, WU Zhi-ping and SHI Huan. New Approach for Graded and Classified Cloud Data Access Control for Public Security Based on TFR Model [J]. Computer Science, 2020, 47(6A): 400-403.
[11] PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318.
[12] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[13] SHI Yu-qing, LING Jie. Online/Offline Attribute-based Encryption with User and Attribute Authority Accountability [J]. Computer Science, 2020, 47(4): 292-297.
[14] TU Yuan-fei,ZHANG Cheng-zhen. Secure and Efficient Electronic Health Records for Cloud [J]. Computer Science, 2020, 47(2): 294-299.
[15] QIAO Mao,QIN Ling. AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services [J]. Computer Science, 2019, 46(7): 96-101.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!