Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2022

25.07.2022

Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing

verfasst von: Xiaodong Yang, Tian Tian, Jiaqi Wang, Caifen Wang

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, with the rapid development of smart health-care based on electronic health records, it remarkably supplies a promising way to alleviate the shortage of medical resources and improve medical efficiency. Meanwhile, data in electronic health records are sensitive and require protection against unauthorized access. However, most previous electronic health records sharing schemes are vulnerable to data leakage and forgery. To address these challenging problems, we propose a new electronic health record sharing scheme. We use the certificateless cryptosystem to encrypt keywords, which solves the certificate management problem and key escrow problem. The proposed scheme also supports multi-user search and the user authorization table can be used to modify access permissions of medical data users. Besides, the root values of the Merkle trees are written into the blockchain to ensure anti-tampering, integrity and traceability of search results. Moreover, a smart contract enables a fair transaction between cloud server provider and medical data users without trusted third parties. We prove that the proposed scheme is secure against the keyword guessing attack in the random oracle model. Furthermore, performance analysis demonstrates that our scheme has greater computational efficiency compared with other related schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bahga A, Madisetti VK (2013) A cloud-based approach for interoperable electronic health records. IEEE Journal of Biomedical and Health Informatics 17(5), 894–906CrossRef Bahga A, Madisetti VK (2013) A cloud-based approach for interoperable electronic health records. IEEE Journal of Biomedical and Health Informatics 17(5), 894–906CrossRef
2.
Zurück zum Zitat Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on parallel and distributed systems 25(1):222–233CrossRef Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on parallel and distributed systems 25(1):222–233CrossRef
3.
Zurück zum Zitat Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp 44–55 Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp 44–55
4.
Zurück zum Zitat Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security, pp 452–473 Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security, pp 452–473
5.
Zurück zum Zitat Islam S, Obaidat MS, Rajeev V, Amin R (2017) Design of a certificateless designated server based searchable public key encryption scheme. In: International Conference on Mathematics and Computing, pp 3–15 Islam S, Obaidat MS, Rajeev V, Amin R (2017) Design of a certificateless designated server based searchable public key encryption scheme. In: International Conference on Mathematics and Computing, pp 3–15
6.
Zurück zum Zitat Swetha K, Narasinga MR (2016) Dynamic searchable encryption over ditributed cloud storage. Asian Journal of Information Technology 15(23), 4763–4769 Swetha K, Narasinga MR (2016) Dynamic searchable encryption over ditributed cloud storage. Asian Journal of Information Technology 15(23), 4763–4769
7.
Zurück zum Zitat Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: Using blockchain for medical data access and permission management. In: 2016 2nd international conference on open and big data (OBD), pp 25–30 Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: Using blockchain for medical data access and permission management. In: 2016 2nd international conference on open and big data (OBD), pp 25–30
8.
Zurück zum Zitat Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE international congress on big data (BigData congress), pp 557–564 Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE international congress on big data (BigData congress), pp 557–564
9.
Zurück zum Zitat Delmolino K, Arnett M, Kosba A, Miller A, Shi E (2016) Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In: International conference on financial cryptography and data security, pp 79–94 Delmolino K, Arnett M, Kosba A, Miller A, Shi E (2016) Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In: International conference on financial cryptography and data security, pp 79–94
10.
Zurück zum Zitat Yang Y, Lin H, Liu X, Guo W, Zheng X, Liu Z (2019) Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment. IEEE Access 7:140818–140832CrossRef Yang Y, Lin H, Liu X, Guo W, Zheng X, Liu Z (2019) Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment. IEEE Access 7:140818–140832CrossRef
11.
Zurück zum Zitat Guo R, Shi H, Zheng D, Jing C, Zhuang C, Wang Z (2019) Flexible and efficient blockchain-based abe scheme with multi-authority for medical on demand in telemedicine system. IEEE Access 7:88012–88025CrossRef Guo R, Shi H, Zheng D, Jing C, Zhuang C, Wang Z (2019) Flexible and efficient blockchain-based abe scheme with multi-authority for medical on demand in telemedicine system. IEEE Access 7:88012–88025CrossRef
12.
Zurück zum Zitat Chen L, Lee WK, Chang CC, Choo KKR, Zhang N (2019) Blockchain based searchable encryption for electronic health record sharing. Future generation computer systems 95:420–429CrossRef Chen L, Lee WK, Chang CC, Choo KKR, Zhang N (2019) Blockchain based searchable encryption for electronic health record sharing. Future generation computer systems 95:420–429CrossRef
13.
Zurück zum Zitat Zhang XY, Zhang P (2016) Recent perspectives of electronic medical record systems. Experimental and therapeutic medicine 11(6):2083–2085CrossRef Zhang XY, Zhang P (2016) Recent perspectives of electronic medical record systems. Experimental and therapeutic medicine 11(6):2083–2085CrossRef
14.
Zurück zum Zitat Shen M, Ma B, Zhu L (2018) Cloud-based approximate constrainedshortest distance queries over encrypted graphs with privacy protection. IEEE transactions on information forensics & security 13(4):940–953CrossRef Shen M, Ma B, Zhu L (2018) Cloud-based approximate constrainedshortest distance queries over encrypted graphs with privacy protection. IEEE transactions on information forensics & security 13(4):940–953CrossRef
15.
Zurück zum Zitat Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2019) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Transactions on Dependable and secure computing 18(1):490–504CrossRef Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2019) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Transactions on Dependable and secure computing 18(1):490–504CrossRef
17.
Zurück zum Zitat Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications, pp 73–86 Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications, pp 73–86
18.
Zurück zum Zitat Soleimanian A, Khazaei S (2019) Publicly verifiable searchable symmetric encryption based on efficient cryptographic components. Designs, Codes and Cryptography 87(1), 123–147MathSciNetCrossRef Soleimanian A, Khazaei S (2019) Publicly verifiable searchable symmetric encryption based on efficient cryptographic components. Designs, Codes and Cryptography 87(1), 123–147MathSciNetCrossRef
19.
Zurück zum Zitat Sun SF, Yuan X, Liu JK, Steinfeld R, Sakzad A, Vo V, Nepal S (2018) Practical backward-secure searchable encryption from symmetric puncturable encryption. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp 763–780 Sun SF, Yuan X, Liu JK, Steinfeld R, Sakzad A, Vo V, Nepal S (2018) Practical backward-secure searchable encryption from symmetric puncturable encryption. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp 763–780
20.
Zurück zum Zitat Wu L, Zhang Y, Ma M, Kumar N, He D (2019) Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things. Annales des Telecommunications 74(7-8):423–434 Wu L, Zhang Y, Ma M, Kumar N, He D (2019) Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things. Annales des Telecommunications 74(7-8):423–434
21.
Zurück zum Zitat Boneh D, Crescenzo DG, Ostrovsky R, Persiano G (2004) Publickey encryption with keyword search. In: in Proc. EUROCRTPR, vol 3027, pp 44–55 Boneh D, Crescenzo DG, Ostrovsky R, Persiano G (2004) Publickey encryption with keyword search. In: in Proc. EUROCRTPR, vol 3027, pp 44–55
22.
Zurück zum Zitat Jiang P, Guo F, Mu Y (2019) Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Theoretical Computer Science 767:51–72MathSciNetCrossRef Jiang P, Guo F, Mu Y (2019) Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Theoretical Computer Science 767:51–72MathSciNetCrossRef
23.
Zurück zum Zitat Li H, Huang Q, Shen J, Yang G, Susilo W (2019) Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Information Sciences 481:330–343CrossRef Li H, Huang Q, Shen J, Yang G, Susilo W (2019) Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Information Sciences 481:330–343CrossRef
24.
Zurück zum Zitat Wu TY, Tsai TT, Tseng YM (2014) Efficient searchable id-based encryption with a designated server. annals of telecommunications-annales des télécommunications 69(7):391–402 Wu TY, Tsai TT, Tseng YM (2014) Efficient searchable id-based encryption with a designated server. annals of telecommunications-annales des télécommunications 69(7):391–402
25.
Zurück zum Zitat Beak J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: in Proc. 2008 International Conference on Computational Science and Its Applications, pp 1249–1259 Beak J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: in Proc. 2008 International Conference on Computational Science and Its Applications, pp 1249–1259
27.
Zurück zum Zitat Uwizeye E, Wang J, Cheng Z, Li F (2019) Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Annals of Telecommunications 74(7), 435–449CrossRef Uwizeye E, Wang J, Cheng Z, Li F (2019) Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Annals of Telecommunications 74(7), 435–449CrossRef
28.
Zurück zum Zitat Wu L, Zhang Y, Ma M, Kumar N, He D (2019) Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things. Ann Telecommun 74(7):423–434 Wu L, Zhang Y, Ma M, Kumar N, He D (2019) Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things. Ann Telecommun 74(7):423–434
29.
Zurück zum Zitat Sun L, Xu C, Li C, Li Y (2020) Server-aided searchable encryption in multi-user setting. Computer Communications 164:25–30CrossRef Sun L, Xu C, Li C, Li Y (2020) Server-aided searchable encryption in multi-user setting. Computer Communications 164:25–30CrossRef
31.
Zurück zum Zitat Chenam VB, Ali ST (2022) A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against ikga. Computer Standards & Interfaces 81:103603CrossRef Chenam VB, Ali ST (2022) A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against ikga. Computer Standards & Interfaces 81:103603CrossRef
33.
Zurück zum Zitat Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp 2110–2118 Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp 2110–2118
34.
Zurück zum Zitat Zheng Q, Xu S, Ateniese G (2014) Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE conference on computer communications, pp 522–530 Zheng Q, Xu S, Ateniese G (2014) Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE conference on computer communications, pp 522–530
35.
Zurück zum Zitat Kang J, Yu R, Huang X, Wu M, Maharjan S, Xie S, Zhang Y (2018) Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet of Things Journal 6(3), 4660–4670CrossRef Kang J, Yu R, Huang X, Wu M, Maharjan S, Xie S, Zhang Y (2018) Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet of Things Journal 6(3), 4660–4670CrossRef
36.
Zurück zum Zitat Hu S, Cai C, Wang Q, Wang C, Luo X, Ren K (2018) Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp 792–800 Hu S, Cai C, Wang Q, Wang C, Luo X, Ren K (2018) Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp 792–800
37.
Zurück zum Zitat Szabo N (1996) Smart contracts: building blocks for digital markets. EXTROPY: The Journal of Transhumanist Thought (16) 18(2):28 Szabo N (1996) Smart contracts: building blocks for digital markets. EXTROPY: The Journal of Transhumanist Thought (16) 18(2):28
38.
Zurück zum Zitat Wood G, et al. (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1–32 Wood G, et al. (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1–32
39.
Zurück zum Zitat Li H, Wang T, Qiao Z, Yang B, Gong Y, Wang J, Qiu G (2021) Blockchain-based searchable encryption with efficient result verification and fair payment. Journal of Information Security and Applications 58:102791CrossRef Li H, Wang T, Qiao Z, Yang B, Gong Y, Wang J, Qiu G (2021) Blockchain-based searchable encryption with efficient result verification and fair payment. Journal of Information Security and Applications 58:102791CrossRef
Metadaten
Titel
Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing
verfasst von
Xiaodong Yang
Tian Tian
Jiaqi Wang
Caifen Wang
Publikationsdatum
25.07.2022
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2022
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01345-0

Weitere Artikel der Ausgabe 5/2022

Peer-to-Peer Networking and Applications 5/2022 Zur Ausgabe

Premium Partner