Attribute Based Signature Encryption Scheme Based on Cloud Computing in Medical Social Networks

Authors

  • Jiabin Li Shandong Qingdao Integrated Traditional Chinese and Western Medicine Hospital/NO.5 PEOPLE’S Hospital of Qingdao, Qingdao, 266000, Shandong, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1338

Keywords:

Attribute base signature, cloud server, medical social network, cloud assisted verification

Abstract

The emergence of mobile medical social networks has provided great convenience for patients to communicate with each other about their medical conditions, promoting efficient and high-quality communication and exchange among patients. However, at the same time, it has also raised issues of confidentiality and privacy of patient data. In response to this issue, this article proposes a cloud-based attribute-based signature encryption scheme that can effectively protect the privacy of patient data. The patient encrypts their medical information and uploads it to the cloud server. When the data user wants to access the patient’s information, the cloud server helps the data user partially decrypt and verify the integrity of the data, which to some extent reduces the computational workload of the data user. Meanwhile, under the random oracle model, it has been proven that the scheme satisfies the unforgeability under selective message attacks, indistinguishability under selective cipher text attacks, and attribute privacy security. Theoretical analysis and numerical simulation experiments show that this scheme has higher efficiency than existing schemes in the signing and decryption stages.

Downloads

Download data is not yet available.

Author Biography

Jiabin Li, Shandong Qingdao Integrated Traditional Chinese and Western Medicine Hospital/NO.5 PEOPLE’S Hospital of Qingdao, Qingdao, 266000, Shandong, China

Jiabin Li obtained a Master’s degree in Computer Technology from Ocean University of China in 2012. I am currently employed as the Director of the Information Department and Senior Engineer at Qingdao Integrated Traditional Chinese and Western Medicine Hospital/Qingdao Fifth People’s Hospital in Shandong Province. The main research directions are medical informatization, smart healthcare, network security, and other fields.

References

Dai H, Zhen Z, Zhang Y. Blockchain for Internet of Things: A survey [J]. IEEE Internet Things, 2019, 6(5): 8076–8094.

Deng Fuhu, Wang Yali, Peng Li, et al. Revocable cloud-assisted attribute-based signcryption in personal health system [J]. IEEE Access, 2019, 7: 120950–120960. doi: 10.1109/ACCESS.2019.2933636.

Arfaoui A, Boudia O R M, Kribeche A, et al. Context-aware access control and anonymous authentication in WBAN [J]. Computers & Security, 2020, 88: 101496. doi: 10.1016/j.cose.2019.03.017.

Xu Chang, Wang Jiachen, Zhu Liehuang, et al. Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems [J]. Peer-to-Peer Networking and Applications, 2021, 14(4): 1841–1853. doi: 10.1007/s12083-021-01075-9.

Nie Xuyun, Bao Yangyang, Sun Jianfei, et al. A multi-authority attribute-based signcryption scheme [J]. Journal of Cyber Security, 2018, 3(5): 15–24. doi: 10.19363/J.cnki.cn10-1380/tn.2018.09.02.

Niu Shufen, Liu Wenke, Chen Lixia, et al. Data sharing scheme of electronic medical record based on proxy Re- encryption [J] Computer Engineering, 2021, 47(6): 164–171. doi: 10.19678/j.issn.1000-3428.005 8229.

Pawar PM, Nielsen RH, Prasad NR, Ohmori S, Prasad R. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks. JCSANDM [Internet]. 2012 Apr. 25 [cited 2023 Dec. 8];1(2–3): 204–225.

Sahai A and Waters B. Fuzzy identity-based encryption [C]. The 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457–473. doi: 10.1007/ 11426639_27.

Ge Chunpeng, Susilo W, Baek J, et al. Revocable attribute-based encryption with data integrity in clouds [J]. IEEE Transactions on Dependable and Secure Computing, 2021, 19(5): 2864–2872. doi: 10.1109/TDSC. 2021.3065999.

Tu Shanshan, Waqas M, Huang Fengming, et al. A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing [J]. Computer Networks, 2021, 195: 108196. doi: 10.1016/J. COMNET.2021.108196.

Tysowski P K, Hasan M A. Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds[J]. IEEE Transactions on Cloud Computing, 2013, 1(2): 172–186.

Rasori M, La Manna M, Perazzo P, et al. A survey on attribute-based encryption schemes suitable for the internet of things[J]. IEEE Internet of Things Journal, 2022, 9(11): 8269–8290.

Hovorushchenko T, Pavlova O, Kostiuk M. Method of Increasing the Security of Smart Parking System. JCSANDM [Internet]. 2023 May 18 [cited 2023 Dec. 8];12(03):297–314.

Deng Ningzhi, Deng Shaojiang, Hu Chunqiang, et al. An efficient revocable attribute-based signcryption scheme with outsourced unsigncryption in cloud computing [J]. IEEE Access, 2020, 8: 42805–42815. doi: 10.1109/ACCESS.2019. 2963233.

Liu Suhui, Chen Liquan, Wang Huaqun, et al. O3HSC: Outsourced online/offline hybrid signcryption for wireless body area networks [J]. IEEE Transactions on Network and Service Management, 2022, 19(3): 2421–2433. doi:10.1109/ TNSM.2022.3153485.

Ming Yang and Zhang Tingting. Efficient privacy- preserving access control scheme in electronic health records system [J]. Sensors, 2018, 18(10):3520.doi: 10.3390/s18103520.

Han Yiliang and Lu Wanyi. Attribute based generalized signcryption for online social network [C]. 2015 34th Chinese Control Conference (CCC), Hangzhou, China, 2015: 6434–6439. doi: 10.1109/ChiCC.2015. 7260653.

Suresh M, Amritha PP, Mohan AK, Kumar VA. An Investigation on HTTP/2 Security. JCSANDM [Internet]. 2018 Jan. 4 [cited 2023 Dec. 9].

Li X. Construction of a Smart City Network Information Security Evaluation Model Based on GRA-BPNN. JCSANDM [Internet]. 2023 Jan. 31 [cited 2023 Dec. 9];11(06):755–776.

Belguith S, Kaaniche N, Hammoudeh M, et al. PROUD: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IOT applications [J]. Future Generation Computer Systems, 2020, 111: 899–918. doi: 10.1016/j.future. 2019.11.012.

Bouchaala M, Ghazel C, and Saidanela. TRAK-CPABE: A novel traceable, revocable and accountable ciphertext-policy attribute-based encryption scheme in cloud computing [J]. Journal of Information Security and Applications, 2021, 61: 102914. doi: 10.1016/j.jisa.2021.10 2914.

Obiri I A, Xia Qi, Xia Hu, et al. Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable [J]. Journal of Computer Security, 2022, 30(2): 291–324. doi: 10.3233/JCS-210045.

Yu Jiguo, Liu Suhui, Wang Shengling, et al. LH-ABSC: A lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT [J]. IEEE Internet of Things Journal, 2020, 7(9): 7949–7966. doi: 10. 1109/JIOT.2020.2992288.

Bethencourt, J, Sahai, A, Waters B. Ciphertext-policy attribute-based encryption [C]. IEEE Symposium on Security and Privacy IEEE, 2007: 321–334.

Chase M. Multi-authority attribute based encryption [C]. Theory of Cryptography Conference, Springer, 2007: 515–534.

Zhong H, Zhu W, Xu Y, et al. Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage [J]. Soft Computing, 2018, 22(1): 243–251.

Vázquez FI, Annessi R, Zseby T. Analytic Study of Features for the Detection of Covert Timing Channels in NetworkTraffic. JCSANDM [Internet]. 2017 Nov. 30 [cited 2023 Dec. 8];6(3):245–270.

Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization [C]. International Workshop on Public Key Cryptography, Springer, 2011: 53–70.

Zhang K, Li H, Ma J, et al. Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability [J], Science China Information Sciences, 2018, 61(3): 032102.

Qiao H, Ren J, Wang Z, et al. Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing [J], Future Generation Computer Systems, 2018, 88: 107–116.

Downloads

Published

2024-04-09

How to Cite

1.
Li J. Attribute Based Signature Encryption Scheme Based on Cloud Computing in Medical Social Networks. JCSANDM [Internet]. 2024 Apr. 9 [cited 2024 Jul. 25];13(03):517-40. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/24549

Issue

Section

Cyber Security Issues and Solutions