Skip to main content

2017 | OriginalPaper | Buchkapitel

Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud

verfasst von : Rui Guo, Xiong Li, Dong Zheng

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the Medical Information Systems (MIS), the patient outsources his e-health records, a dramatically huge amount of health data, to a third party like cloud service provider. The Internet providing host-to-host communication using TCP/IP network topology has not satisfied the growing demands of data processing in MIS. Based on the content-to-consumer paradigm, content-centric networking architecture was proposed for simple easy-to-manage caching features to users. In this paper, we proposed a privacy-preserving e-health records scheme that protects name and content simultaneously. Our proposal has multi-authority without a trusted single or central authority to distribute secret keys, which avoids the key escrow problem and meets the distributed features of MIS. As we know, this scheme is the first multi-authority content-based encryption (MA-CBE). Furthermore, this MA-CBE resists up to (N-1) corrupted authorities collusion attack, and the security is proven to be semantically secure based on the standard decisional bilinear Diffie-Hellman assumption. Our comparison analysis reports that the proposal gives a better performance than other related schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Cisco: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Updata, 2014–2019. Cisco White Paper (2015) Cisco: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Updata, 2014–2019. Cisco White Paper (2015)
4.
Zurück zum Zitat Jacobson, V., Smetters, D.K., Thomton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networing named content. In: 5th International Conference on Emerging and Technologies, pp. 1–12. ACM, New York (2009) Jacobson, V., Smetters, D.K., Thomton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networing named content. In: 5th International Conference on Emerging and Technologies, pp. 1–12. ACM, New York (2009)
5.
Zurück zum Zitat Tang, J.H., Quek, T.Q.S.: The role of cloud computing in content-centric mobile networking. IEEE Commun. Mag. 54, 52–59 (2016)CrossRef Tang, J.H., Quek, T.Q.S.: The role of cloud computing in content-centric mobile networking. IEEE Commun. Mag. 54, 52–59 (2016)CrossRef
6.
Zurück zum Zitat Li, B., Ma, M.D., Yang, X.B.: Perceptive forwaiding in content-centric networks. IEEE Access. 5, 4595–4605 (2017)CrossRef Li, B., Ma, M.D., Yang, X.B.: Perceptive forwaiding in content-centric networks. IEEE Access. 5, 4595–4605 (2017)CrossRef
7.
Zurück zum Zitat Asghar, M.R., Bernardini, C., Crispo, B.: PROTECTOR: privacy-preserving information lookup in content-centric networks. In: IEEE International Conference on Communications, pp. 1–7. IEEE Press, New York (2016) Asghar, M.R., Bernardini, C., Crispo, B.: PROTECTOR: privacy-preserving information lookup in content-centric networks. In: IEEE International Conference on Communications, pp. 1–7. IEEE Press, New York (2016)
8.
Zurück zum Zitat Xia, Z., Zhu, Y., Sun, X., Qin, Z., Ren, K.: Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Cloud Comput. 99, 1–1 (2015)CrossRef Xia, Z., Zhu, Y., Sun, X., Qin, Z., Ren, K.: Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Cloud Comput. 99, 1–1 (2015)CrossRef
9.
Zurück zum Zitat Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016)CrossRef Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016)CrossRef
10.
Zurück zum Zitat Xia, Z., Xiong, N.N., Vasilakos, A.V., Sun, X.: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. 387, 195–204 (2017)CrossRef Xia, Z., Xiong, N.N., Vasilakos, A.V., Sun, X.: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. 387, 195–204 (2017)CrossRef
11.
Zurück zum Zitat Goel, P., Holmberg, E., Konezny, M., Ayyagari, R., Sillman, D.: CCNx packet processing on PARC router platform. In: 2nd ACM Conference on Information-Centric Networking, pp. 211–212. ACM, New York (2015) Goel, P., Holmberg, E., Konezny, M., Ayyagari, R., Sillman, D.: CCNx packet processing on PARC router platform. In: 2nd ACM Conference on Information-Centric Networking, pp. 211–212. ACM, New York (2015)
12.
Zurück zum Zitat Chaabane, A., Cristofaro, E.D., Kaafar, M.A., Uzun, E.: Privacy in content-oriented networking: threats and contermesures. ACM SIGCOMM Comput. Commun. Rev. 43, 25–33 (2013)CrossRef Chaabane, A., Cristofaro, E.D., Kaafar, M.A., Uzun, E.: Privacy in content-oriented networking: threats and contermesures. ACM SIGCOMM Comput. Commun. Rev. 43, 25–33 (2013)CrossRef
13.
Zurück zum Zitat Fotiou, N., Trossen, D., Marias, G.F., Kostopoulos, A., Polyzos, G.C.: Enhancing information lookup privacy through homomorphic encryption. Secur. Commun. Netw. 7, 2804–2814 (2013)CrossRef Fotiou, N., Trossen, D., Marias, G.F., Kostopoulos, A., Polyzos, G.C.: Enhancing information lookup privacy through homomorphic encryption. Secur. Commun. Netw. 7, 2804–2814 (2013)CrossRef
14.
Zurück zum Zitat Mannes, E., Maziero, C., Lassance, L.C., Borges, F.: Controle de acesso baseado em reencriptação por proxy em Redes Centradas em Informação. In: 14th Brazilian Symposium on Information and Computing Systems Security, pp. 2–15. SBC Press (2014) Mannes, E., Maziero, C., Lassance, L.C., Borges, F.: Controle de acesso baseado em reencriptação por proxy em Redes Centradas em Informação. In: 14th Brazilian Symposium on Information and Computing Systems Security, pp. 2–15. SBC Press (2014)
15.
Zurück zum Zitat Tournai, R., Misra, S., Kliewer, J., Ortegel, S., Mick, T.: Catch me if you can: a practial framwork to evade censorship in information certirc networks. In: 2nd ACM Conference on Information-Centric Networking, pp. 167–176. ACM, New York (2015) Tournai, R., Misra, S., Kliewer, J., Ortegel, S., Mick, T.: Catch me if you can: a practial framwork to evade censorship in information certirc networks. In: 2nd ACM Conference on Information-Centric Networking, pp. 167–176. ACM, New York (2015)
16.
Zurück zum Zitat Tsudik, G., Uzun, E., Wood, C.A.: AC3N: anonymous communication in content-centric networking. In: 13rd IEEE Annual Consumer Communications & Networking Conference, pp. 988–991. IEEE Press, New York (2016) Tsudik, G., Uzun, E., Wood, C.A.: AC3N: anonymous communication in content-centric networking. In: 13rd IEEE Annual Consumer Communications & Networking Conference, pp. 988–991. IEEE Press, New York (2016)
18.
Zurück zum Zitat Lin, X.Y., Tang, S.H., Xu, L.L., Wang, H.Q., Chen, J.: Two-factor data access control with efficient revocation for multi-authority cloud storage systems. IEEE Access 5, 393–405 (2017)CrossRef Lin, X.Y., Tang, S.H., Xu, L.L., Wang, H.Q., Chen, J.: Two-factor data access control with efficient revocation for multi-authority cloud storage systems. IEEE Access 5, 393–405 (2017)CrossRef
19.
Zurück zum Zitat Qian, H.L., Li, J.G., Zhang, Y.C., Han, G.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14, 487–497 (2015)CrossRef Qian, H.L., Li, J.G., Zhang, Y.C., Han, G.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14, 487–497 (2015)CrossRef
Metadaten
Titel
Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud
verfasst von
Rui Guo
Xiong Li
Dong Zheng
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-68542-7_22