Skip to main content
Erschienen in: Cluster Computing 6/2019

27.10.2017

Enhanced secure sharing of PHR’s in cloud using user usage based attribute based encryption and signature with keyword search

verfasst von: M. Lilly Florence, Dhina Suresh

Erschienen in: Cluster Computing | Sonderheft 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud based Personal health record (PHR) is an emerging cloud based platform for exchanging a person’s health information in a secure manner. There occur many security issues when records of the data owners are outsourced through the third party cloud providers. The health records which are sensitive must be stored and retrieved through a secure source without any loss in the data. Nevertheless sharing and searching of the data is the key aspect, but when it is outsourced undeniably it is a cumbersome task. It may lead to unveil the sensitive information and so the records may become vulnerable to the hackers. In this report, we have suggested a novel access control structure called as user usage based encryption constructed on the searchable attribute based encryption to guarantee the data protection. Usage is mapped as credential with a time frame to every private attribute. The data user can decipher a fortified attribute only if there is a match between the credentials associated with the attribute. Using the feature extraction algorithm the searchable encryption scheme enables a consistent routing of encrypted attributes. Multi-Credential routing is applied to strengthen the confidentiality of the fragile records. We allow the data user to perpetuate the credentials according to their usage criteria also the user receives the keys as labels along with the credentials. The data owner will be able to associate each enciphered attribute with a set of credentials. Before beginning the encryption scheme we apply the singular value decomposition algorithm to the unutilized or less used attributes to reduce the attribute set. Additionally the data user confidentiality pitfalls are tackled using the semantic clustering of data user. To preserve the data user confidentiality reliable overlay privacy preserving protocol is designed. We manifest a complete security analysis so that our recommended system dominates the up to date approaches in terms of communication and ciphering cost.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, Y., Paxson, V., Katz, R.H.: What’s new about cloud computing security?, Technical Report UCB/EECS-2010-5, Electrical Engineering and Computer Sciences, University of California at Berkeley (2010) Chen, Y., Paxson, V., Katz, R.H.: What’s new about cloud computing security?, Technical Report UCB/EECS-2010-5, Electrical Engineering and Computer Sciences, University of California at Berkeley (2010)
7.
Zurück zum Zitat Lohr, H., Sadeghi, A.-R., Winandy, M.: Securing the e-health cloud. In: Proceedings of the 1st ACM International Health Informatics Symposium, ser. IHI ’ vol. 10, pp. 220–229 (2010) Lohr, H., Sadeghi, A.-R., Winandy, M.: Securing the e-health cloud. In: Proceedings of the 1st ACM International Health Informatics Symposium, ser. IHI ’ vol. 10, pp. 220–229 (2010)
8.
Zurück zum Zitat Ibraimi, L., Asim, M., Petkovic, M.: Secure management of personal health records by applying attribute-based encryption. In Technical Report, University of Twente (2009) Ibraimi, L., Asim, M., Petkovic, M.: Secure management of personal health records by applying attribute-based encryption. In Technical Report, University of Twente (2009)
9.
Zurück zum Zitat Liu, P., Wang, J., Ma, H., Nie, H.: Efficient verifiable public key encryption with keyword search based on KP-ABE. In: Proceedings 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 584–589. IEEE (2014) Liu, P., Wang, J., Ma, H., Nie, H.: Efficient verifiable public key encryption with keyword search based on KP-ABE. In: Proceedings 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 584–589. IEEE (2014)
10.
Zurück zum Zitat Yau, W., Phan, R. Heng, S., Goi, B.: Proxy re-encryption with keyword search, new definitions and algorithms. In: Proceedings International Conferences on Security Technology, Disaster Recovery and Business Continuity, Jeju Island, Korea, vol. 122, pp. 149–160. 13–15 December 2010 Yau, W., Phan, R. Heng, S., Goi, B.: Proxy re-encryption with keyword search, new definitions and algorithms. In: Proceedings International Conferences on Security Technology, Disaster Recovery and Business Continuity, Jeju Island, Korea, vol. 122, pp. 149–160. 13–15 December 2010
11.
Zurück zum Zitat Jiang, X.: Asymmetric principal component and discriminant analyses for pattern classification. IEEE Trans. Pattern Anal. Mach. Intell. 31(5), 931–937 (2009)CrossRef Jiang, X.: Asymmetric principal component and discriminant analyses for pattern classification. IEEE Trans. Pattern Anal. Mach. Intell. 31(5), 931–937 (2009)CrossRef
12.
Zurück zum Zitat Zhang, Z., Zhao, M., Chow, T.W.S.: Binary-and multi-class group sparse canonical correlation analysis for feature extraction and classification. IEEE Trans. Knowl. Eng. 25(10), 2192–2205 (2013)CrossRef Zhang, Z., Zhao, M., Chow, T.W.S.: Binary-and multi-class group sparse canonical correlation analysis for feature extraction and classification. IEEE Trans. Knowl. Eng. 25(10), 2192–2205 (2013)CrossRef
13.
Zurück zum Zitat Garcia, E.K., Feldman, S., Gupta, M.R., Srivastava, S.: Completely lazy learning. IEEE Trans. Knowl. Data Eng. 22(9), 1274–1285 (2010)CrossRef Garcia, E.K., Feldman, S., Gupta, M.R., Srivastava, S.: Completely lazy learning. IEEE Trans. Knowl. Data Eng. 22(9), 1274–1285 (2010)CrossRef
14.
Zurück zum Zitat Jiang, Y., Hayashi, I., Wang, S.: Knowledge acquisition method based on singular value decomposition for human motion analysis. IEEE Trans. Knowl. Data Eng. 26(12), 3038–3050 (2014)CrossRef Jiang, Y., Hayashi, I., Wang, S.: Knowledge acquisition method based on singular value decomposition for human motion analysis. IEEE Trans. Knowl. Data Eng. 26(12), 3038–3050 (2014)CrossRef
15.
Zurück zum Zitat Karakoyunlu, D., Gurkaynak, F.K., Sunar, B., Leblebici, Y.: Efficient side-channel-aware implementations of elliptic curve cryptosystems over prime fields. IET Inf. Secur. 4(1), 30–43 (2010)CrossRef Karakoyunlu, D., Gurkaynak, F.K., Sunar, B., Leblebici, Y.: Efficient side-channel-aware implementations of elliptic curve cryptosystems over prime fields. IET Inf. Secur. 4(1), 30–43 (2010)CrossRef
16.
Zurück zum Zitat Florence, L., Suresh, D.: Cloud security and DES algorithm a review. In: International Journal of Computational Intelligence and Informatics, vol. 5, No. 2 (September 2015) Florence, L., Suresh, D.: Cloud security and DES algorithm a review. In: International Journal of Computational Intelligence and Informatics, vol. 5, No. 2 (September 2015)
17.
Zurück zum Zitat Shamir, A.: How to share a secret, 3rd\(\sim \)Ed. Commun. ACM 22(11), 612–613 (1979)CrossRef Shamir, A.: How to share a secret, 3rd\(\sim \)Ed. Commun. ACM 22(11), 612–613 (1979)CrossRef
18.
Zurück zum Zitat Shamir, A.: Identity-based cryptosystems and signature schemes, In: Proceedings of CRYPTO 84 on Advances in cryptology, pp. 47–53, Springer, New York (1985) Shamir, A.: Identity-based cryptosystems and signature schemes, In: Proceedings of CRYPTO 84 on Advances in cryptology, pp. 47–53, Springer, New York (1985)
19.
Zurück zum Zitat Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 213–229. Springer, New York (2001)CrossRef Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 213–229. Springer, New York (2001)CrossRef
20.
Zurück zum Zitat Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Advances in Cryptology–Euro crypt, vol. 3027 of LNCS, pp. 223–238. Springer, New York (2004)CrossRef Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Advances in Cryptology–Euro crypt, vol. 3027 of LNCS, pp. 223–238. Springer, New York (2004)CrossRef
21.
Zurück zum Zitat Sahai, A., Waters, B.: Fuzzy identity based encryption. In: Advances in Cryptology-Euro crypt, vol. 3494 of LNCS, pp. 457–473. Springer, New York (2005) Sahai, A., Waters, B.: Fuzzy identity based encryption. In: Advances in Cryptology-Euro crypt, vol. 3494 of LNCS, pp. 457–473. Springer, New York (2005)
22.
Zurück zum Zitat Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security. pp. 89–98 (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security. pp. 89–98 (2006)
23.
Zurück zum Zitat Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: IEEE INFOCOM’10 (2010) Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: IEEE INFOCOM’10 (2010)
24.
Zurück zum Zitat Adida, B.: Special topics in cryptography, instructors, Ran Canetti and Ron Rivest Lecture 25, Pairing-Based Cryptography Adida, B.: Special topics in cryptography, instructors, Ran Canetti and Ron Rivest Lecture 25, Pairing-Based Cryptography
25.
Zurück zum Zitat Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Cryptology, vol. 6571, pp. 53–70 (2011) Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Cryptology, vol. 6571, pp. 53–70 (2011)
26.
Zurück zum Zitat Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption, In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption, In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
27.
Zurück zum Zitat Chase, M.: Multi-authority attribute-based encryption, In: The Fourth Theory of Cryptography Conference (TCC 2007) (2007) Chase, M.: Multi-authority attribute-based encryption, In: The Fourth Theory of Cryptography Conference (TCC 2007) (2007)
28.
Zurück zum Zitat Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute-based encryption. In: CCS ’09, 2009 pp. 121–130 Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute-based encryption. In: CCS ’09, 2009 pp. 121–130
29.
Zurück zum Zitat Müller, S., Katzenbeisser, S., Eckert, C.: Distributed attribute based encryption. In: ICISC, pp. 20–36 (2008)CrossRef Müller, S., Katzenbeisser, S., Eckert, C.: Distributed attribute based encryption. In: ICISC, pp. 20–36 (2008)CrossRef
30.
Zurück zum Zitat Müller, S., Katzenbeisser, S., Eckert, C.: On multi-authority cipher text policy attribute based encryption. Bull. Korean Math. Soc. 46(4), 803–819 (2009)MathSciNetCrossRef Müller, S., Katzenbeisser, S., Eckert, C.: On multi-authority cipher text policy attribute based encryption. Bull. Korean Math. Soc. 46(4), 803–819 (2009)MathSciNetCrossRef
31.
Zurück zum Zitat Li, M., Yu, S., Cao, N., Lou, W.: Authorized private keyword search over encrypted personal health records in cloud computing. In: ICDCS ’11 (June 2011) Li, M., Yu, S., Cao, N., Lou, W.: Authorized private keyword search over encrypted personal health records in cloud computing. In: ICDCS ’11 (June 2011)
32.
33.
Zurück zum Zitat Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi keyword ranked search over encrypted cloud data. In: IEEE INFOCOM (2011) Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi keyword ranked search over encrypted cloud data. In: IEEE INFOCOM (2011)
34.
Zurück zum Zitat Sun, W., Yu, S., Lou, W., Hou, Y.T.: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization. In: In the cloud- IEEE Transactions on 2016. www.ieeexplore.ieee.org/ (2016) Sun, W., Yu, S., Lou, W., Hou, Y.T.: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization. In: In the cloud- IEEE Transactions on 2016. www.​ieeexplore.​ieee.​org/​ (2016)
35.
Zurück zum Zitat Yau, W., Phan, R., Heng, S., Goi, B.: Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(2), 2581–2587 (2013)CrossRef Yau, W., Phan, R., Heng, S., Goi, B.: Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(2), 2581–2587 (2013)CrossRef
36.
Zurück zum Zitat Yau, W., Phan, R., Heng, S., Goi, B.: Security models for delegated keyword searching within encrypted contents. J. Internet Serv. Appl. 3(2), 233–241 (2012)CrossRef Yau, W., Phan, R., Heng, S., Goi, B.: Security models for delegated keyword searching within encrypted contents. J. Internet Serv. Appl. 3(2), 233–241 (2012)CrossRef
37.
Zurück zum Zitat Fang, L., Susilo, W., Ge, C., Wang, J.: Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci. 238, 221–241 (2013)MathSciNetCrossRef Fang, L., Susilo, W., Ge, C., Wang, J.: Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci. 238, 221–241 (2013)MathSciNetCrossRef
38.
Zurück zum Zitat Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. In: IEEE Transactions on Parallel and Distributed Systems, vol. 99, no. PrePrints (2010) Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. In: IEEE Transactions on Parallel and Distributed Systems, vol. 99, no. PrePrints (2010)
40.
Zurück zum Zitat Li, M., Lin, D.: The adjacency graphs of LFSRs with primitive-like characteristic polynomials. IEEE Trans. Inf. Theor. 63(2), 1325–1335 (2017)MathSciNetCrossRef Li, M., Lin, D.: The adjacency graphs of LFSRs with primitive-like characteristic polynomials. IEEE Trans. Inf. Theor. 63(2), 1325–1335 (2017)MathSciNetCrossRef
41.
Zurück zum Zitat Jahid, S., Mittal, P., Borisov, N.: Easier, Encryption-based access control in social networks with efficient revocation. In: ASIACCS, Hong Kong (March 2011) Jahid, S., Mittal, P., Borisov, N.: Easier, Encryption-based access control in social networks with efficient revocation. In: ASIACCS, Hong Kong (March 2011)
42.
Zurück zum Zitat Hu, C., Liu, P.: An enhanced searchable public key encryption scheme with a designated tester and its extensions. J. Comput. 7(3), 716–723 (2012)CrossRef Hu, C., Liu, P.: An enhanced searchable public key encryption scheme with a designated tester and its extensions. J. Comput. 7(3), 716–723 (2012)CrossRef
43.
Zurück zum Zitat Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258, 355–370 (2014)CrossRef Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258, 355–370 (2014)CrossRef
Metadaten
Titel
Enhanced secure sharing of PHR’s in cloud using user usage based attribute based encryption and signature with keyword search
verfasst von
M. Lilly Florence
Dhina Suresh
Publikationsdatum
27.10.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 6/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1276-7

Weitere Artikel der Sonderheft 6/2019

Cluster Computing 6/2019 Zur Ausgabe