zbMATH — the first resource for mathematics

A general framework for secure sharing of personal health records in cloud system. (English) Zbl 1374.68182
Summary: Personal Health Record (PHR) has been developed as a promising solution that allows patient-doctors interactions in a very effective way. Cloud technology has been seen as the prominent candidate to store the sensitive medical record in PHR, but to date, the security protection provided is yet inadequate without impacting the practicality of the system. In this paper, we provide an affirmative answer to this problem by proposing a general framework for secure sharing of PHRs. Our system enables patients to securely store and share their PHR in the cloud server (for example, to their carers), and furthermore the treating doctors can refer the patients’ medical record to specialists for research purposes, whenever they are required, while ensuring that the patients’ information remain private. Our system also supports cross domain operations (e.g., with different countries regulations).
68P25 Data encryption (aspects in computer science)
68M14 Distributed systems
Full Text: DOI
[1] Akinyele, J.; Lehmann, C.; Green, M.; Pagano, M.; Peterson, Z.; Rubin, A., Self-protecting electronic medical records using attribute-based encryption, (2010), Cryptology ePrint archive, report 2010/565
[2] Ateniese, G.; Fu, K.; Green, M.; Hohenberger, S., Improved proxy re-encryption schemes with applications to secure distributed storage, (NDSS, (2005), The Internet Society)
[3] Attrapadung, N.; Yamada, S., Duality in ABE: converting attribute based encryption for dual predicate and dual policy via computational encodings, (CT-RSA 2015, LNCS, vol. 9048, (2015), Springer), 87-105 · Zbl 1382.94053
[4] Beimel, A., Secure schemes for secret sharing and key distribution, (1996), Israel Institute of Technology Israel, PhD thesis
[5] Blaze, M.; Bleumer, G.; Strauss, M., Divertible protocols and atomic proxy cryptography, (EUROCRYPT, LNCS, vol. 1403, (1998), Springer), 127-144 · Zbl 0929.68048
[6] Boneh, D.; Lynn, B.; Shacham, H., Short signatures from the Weil pairing, (ASIACRYPT, LNCS, vol. 2248, (2001), Springer), 514-532 · Zbl 1064.94554
[7] Canetti, R.; Hohenberger, S., Chosen-ciphertext secure proxy re-encryption, (CCS’07, (2007), ACM), 185-194
[8] Chase, M., Multi-authority attribute based encryption, (Vadhan, S. P., TCC 2007, LNCS, vol. 4392, (2007), Springer), 515-534 · Zbl 1156.94339
[9] Chase, M.; Chow, S. S.M., Improving privacy and security in multi-authority attribute-based encryption, (CCS 2009, (2009), ACM), 121-130
[10] Deng, H.; Wu, Q.; Qin, B.; Susilo, W.; Liu, J. K.; Shi, W., Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data, (ASIACCS, (2015), ACM), 393-404
[11] Deng, H.; Wu, Q.; Qin, B.; Susilo, W.; Liu, J. K.; Shi, W., Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data, (Bao, F.; Miller, S.; Zhou, J.; Ahn, G., Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS’15, Singapore, April 14-17, 2015, (2015), ACM), 393-404
[12] Garg, S.; Gentry, C.; Halevi, S.; Sahai, A.; Waters, B., Attribute-based encryption for circuits from multilinear maps, (CRYPTO 2013, LNCS, vol. 8043, (2013), Springer), 479-499 · Zbl 1311.94080
[13] Han, J.; Susilo, W.; Mu, Y.; Yan, J., Privacy-preserving decentralized key-policy attribute-based encryption, IEEE Trans. Parallel Distrib. Syst., 23, 11, 2150-2162, (2012)
[14] Hohenberger, S.; Waters, B., Online/offline attribute-based encryption, (Public-Key Cryptography, LNCS, vol. 8383, (2014), Springer), 293-310 · Zbl 1335.94050
[15] Hur, J.; Noh, D. K., Attribute-based access control with efficient revocation in data outsourcing systems, IEEE Trans. Parallel Distrib. Syst., 22, 7, 1214-1221, (2011)
[16] Ibraimi, L.; Asim, M.; Petkovic, M., Secure management of personal health records by applying attribute-based encryption, (July 2009), Centre for Telematics and Information Technology, University of Twente Enschede, Number TR-CTI in CTIT technical report series
[17] Lai, J.; Deng, R. H.; Guan, C.; Weng, J., Attribute-based encryption with verifiable outsourced decryption, IEEE Trans. Inf. Forensics Secur., 8, 8, 1343-1354, (2013)
[18] Lewko, A. B.; Okamoto, T.; Sahai, A.; Takashima, K.; Waters, B., Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption, (EUROCRYPT, LNCS, vol. 6110, (2010), Springer), 62-91 · Zbl 1279.94095
[19] Lewko, A. B.; Rouselakis, Y.; Waters, B., Achieving leakage resilience through dual system encryption, (Ishai, Y., Theory of Cryptography - 8th Theory of Cryptography Conference, Proceedings, TCC 2011, Providence, RI, USA, March 28-30, 2011, Lecture Notes in Computer Science, vol. 6597, (2011), Springer), 70-88 · Zbl 1291.94118
[20] Lewko, A. B.; Waters, B., Decentralizing attribute-based encryption, (Paterson, K. G., EUROCRYPT 2011, LNCS, vol. 6632, (2011), Springer), 568-588 · Zbl 1290.94106
[21] Lewko, A. B.; Waters, B., Unbounded HIBE and attribute-based encryption, (EUROCRYPT, LNCS, vol. 6632, (2011), Springer), 547-567 · Zbl 1290.94105
[22] Li, M.; Yu, S.; Zheng, Y.; Ren, K.; Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption, IEEE Trans. Parallel Distrib. Syst., 24, 1, 131-143, (2013)
[23] Liang, K.; Au, M. H.; Liu, J. K.; Susilo, W.; Wong, D. S.; Yang, G.; Phuong, T. V.X.; Xie, Q., A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing, IEEE Trans. Inf. Forensics Secur., 9, 10, 1667-1680, (2014)
[24] Liang, K.; Fang, L.; Wong, D. S.; Susilo, W., A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security, (2013), Cryptology ePrint archive, report 2013/236
[25] Liang, K.; Liu, J. K.; Wong, D. S.; Susilo, W., An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing, (ESORICS, Lecture Notes in Computer Science, vol. 8712, (2014), Springer), 257-272
[26] Liang, X.; Cao, Z.; Lin, H.; Shao, J., Attribute based proxy re-encryption with delegating capabilities, (ASIACCS, (2009), ACM), 276-286
[27] Liang, X.; Lu, R.; Lin, X.; Shen, X. S., Patient self-controllable access policy on phi in ehealthcare systems, (AHIC, (2010)), 1-5
[28] Liu, Z.; Cao, Z.; Huang, Q.; Wong, D. S.; Yuen, T. H., Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles, (ESORICS, LNCS, vol. 6879, (2011), Springer), 278-297
[29] Lu, R.; Lin, X.; Shen, X. S., SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency, IEEE Trans. Parallel Distrib. Syst., 24, 3, 614-624, (2013)
[30] Luo, S.; Hu, J.; Chen, Z., Ciphertext policy attribute-based proxy re-encryption, (ICICS, LNCS, vol. 6476, (2010), Springer), 401-415
[31] I.E. Magnin, J. Montagnat, The grid and the biomedical community: achievements and open issues, presented at the EGEE User Forum, CERN, Geneva, Switzerland, 2006.
[32] Mizuno, T.; Doi, H., Hybrid proxy re-encryption scheme for attribute-based encryption, (Inscrypt, LNCS, vol. 6151, (2009), Springer), 288-302 · Zbl 1281.94042
[33] Narayan, S.; Gagné, M.; Safavi-Naini, R., Privacy preserving EHR system using attribute-based infrastructure, (CCSW, (2010), ACM), 47-52
[34] Ostrovsky, R.; Sahai, A.; Waters, B., Attribute-based encryption with non-monotonic access structures, (CCS, (2007), ACM), 195-203
[35] Rouselakis, Y.; Waters, B., Efficient statically-secure large-universe multi-authority attribute-based encryption, (FC 2015, (2015), Springer Berlin), 315-332
[36] Sahai, A.; Seyalioglu, H.; Waters, B., Dynamic credentials and ciphertext delegation for attribute-based encryption, (CRYPTO, LNCS, vol. 7417, (2012), Springer), 199-217 · Zbl 1296.94139
[37] Sahai, A.; Waters, B., Fuzzy identity-based encryption, (EUROCRYPT, LNCS, vol. 3494, (2005), Springer), 457-473 · Zbl 1137.94355
[38] Shamir, A., Identity-based cryptosystems and signature schemes, (CRYPTO 84, LNCS, vol. 196, (1984), Springer-Verlag), 47-53 · Zbl 1359.94626
[39] Waters, B., Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions, (CRYPTO, LNCS, vol. 5677, (2009), Springer), 619-636 · Zbl 1252.94101
[40] Waters, B., Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, (Public Key Cryptography, LNCS, vol. 6571, (2011), Springer), 53-70 · Zbl 1291.94165
[41] Wu, Q.; Qin, B.; Zhang, L.; Domingo-Ferrer, J.; Farràs, O.; Manjón, J. A., Contributory broadcast encryption with efficient encryption and short ciphertexts, IEEE Trans. Comput., 65, 2, 466-479, (2016) · Zbl 1360.94337
[42] Xhafa, F.; Wang, J.; Chen, X.; Liu, J. K.; Li, J.; Krause, P., An efficient PHR service system supporting fuzzy keyword search and fine-grained access control, Soft Comput., 18, 9, 1795-1802, (2014)
[43] Yu, S.; Wang, C.; Ren, K.; Lou, W., Attribute based data sharing with attribute revocation, (ASIACCS, (2010), ACM), 261-270
[44] Yu, Z.; Au, M. H.; Xu, Q.; Yang, R.; Han, J., Leakage-resilient functional encryption via pair encodings, (Liu, J. K.; Steinfeld, R., Information Security and Privacy - 21st Australasian Conference, Proceedings, Part i, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Lecture Notes in Computer Science, vol. 9722, (July 2016), Springer), 443-460 · Zbl 1405.94094
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.