Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems

Journal of Information Security and Applications - Tập 54 - Trang 102568 - 2020
Xiaojun Zhang1,2, Yao Tang1, Sheng Cao3, Chao Huang1, Shuang Zheng1
1School of Computer Science, Research Center for Cyber Security, Southwest Petroleum University, Chengdu 610500, China
2Key Laboratory of Financial Mathematics, Putian University (Fujian Province University), Putian 351100, China
3School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China

Tài liệu tham khảo

Lee, 2011, Challenges and research directions in medical cyber-physical systems, 75 Ullah, 2012, A comprehensive survey of wireless body area networks, J Med Syst, 36, 1065, 10.1007/s10916-010-9571-3 Singh, 2013, A view of cloud computing, Commun ACM, 4, 50 Zhang, 2015, Health-CPS: healthcare cyber-physical system assisted by cloud and big data, IEEE Syst J, 11, 88, 10.1109/JSYST.2015.2460747 Zhang, 2018, Healthdep: an efficient and secure deduplication scheme for cloud-assisted ehealth systems, IEEE Trans Ind Inf, 14, 4101, 10.1109/TII.2018.2832251 Zhang, 2019, Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems, Pervasive Mob Comput, 56, 18, 10.1016/j.pmcj.2019.03.004 Sun, 2009, Cross-domain data sharing in distributed electronic health record systems, IEEE Trans Parallel Distrib Syst, 21, 754 Boneh, 2004, Public key encryption with keyword search, 506 Chen, 2015, Dual-server public-key encryption with keyword search for secure cloud storage, IEEE Trans Inf Forensics Secur, 11, 789, 10.1109/TIFS.2015.2510822 Chen, 2016, Server-aided public key encryption with keyword search, vol. 11, 2833 Shamir, 1984, Identity-based cryptosystems and signature schemes, 47 Yau, 2008, Off-line keyword guessing attacks on recent public key encryption with keyword search schemes, 100 Huang, 2017, An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks, Inf Sci (Ny), 403, 1, 10.1016/j.ins.2017.03.038 Zhang, 2016, Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation, IEEE Trans Inf Forensics Secur, 12, 676, 10.1109/TIFS.2016.2631951 Zhang, 2019, Identity-based key-exposure resilient cloud storage public auditing scheme from lattices, Inf Sci (Ny), 472, 223, 10.1016/j.ins.2018.09.013 Zhang, 2019, Blockchain-based public integrity verification for cloud storage against procrastinating auditors, IEEE Trans Cloud Comput, 10.1109/TCC.2019.2908400 Zhang, 2019, CIPPPA: Conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors, IEEE Trans Cloud Comput, 10.1109/TCC.2019.2927219 Liu, 2016, Efficient and privacy-preserving outsourced calculation of rational numbers, IEEE Trans Dependable Secure Comput, 15, 27, 10.1109/TDSC.2016.2536601 Zhang, 2017, Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Inf Sci (Ny), 379, 42, 10.1016/j.ins.2016.04.015 Fu, 2018, Large universe attribute based access control with efficient decryption in cloud storage system, Journal of Systems and Software, 135, 157, 10.1016/j.jss.2017.10.020 Cheng, 2019, Person re-identification over encrypted outsourced surveillance videos Zhang, 2020, Chronos+: an accurate blockchain-based time-stamping scheme for cloud storage, IEEE Trans Serv Comput, 13, 216 Zhang, 2020, PROTECT: Efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage Nagasubramanian, 2020, Securing e-health records using keyless signature infrastructure blockchain technology in the cloud, Neural Computing and Applications, 32, 639, 10.1007/s00521-018-3915-1 Kim, 2018, Blockchain-based edge computing for deep neural network applications, 53 Bashir, 2019, Secure framework for internet of things based e-health system, International Journal of E-Health and Medical Communications, 10, 16, 10.4018/IJEHMC.2019100102 Devarajan, 2019, Fog-assisted personalized healthcare-support system for remote patients with diabetes, J Ambient Intell Humaniz Comput, 10, 3747, 10.1007/s12652-019-01291-5 Song, 2000, Practical techniques for searches on encrypted data, 44 Baek, 2008, Public key encryption with keyword search revisited, 1249 Byun, 2006, Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, 75 Rhee, 2010, Trapdoor security in a searchable public-key encryption scheme with a designated tester, Journal of Systems and Software, 83, 763, 10.1016/j.jss.2009.11.726 Rhee, 2012, Generic construction of designated tester public-key encryption with keyword search, Inf Sci (Ny), 205, 93, 10.1016/j.ins.2012.03.020 Fang, 2013, Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Inf Sci (Ny), 238, 221, 10.1016/j.ins.2013.03.008 Shao, 2010, Proxy re-encryption with keyword search, Inf Sci (Ny), 180, 2576, 10.1016/j.ins.2010.03.026 Fang, 2012, Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search, Theor Comput Sci, 462, 39, 10.1016/j.tcs.2012.08.017 Zheng, 2015, CLKS: Certificateless keyword search on encrypted data, 239 Ma, 2017, Certificateless searchable public key encryption scheme for industrial internet of things, IEEE Trans Ind Inf, 14, 759, 10.1109/TII.2017.2703922 Ma, 2018, Certificateless searchable public key encryption scheme for mobile healthcare system, Computers & Electrical Engineering, 65, 413, 10.1016/j.compeleceng.2017.05.014 Miao, 2017, VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings, Pervasive Mob Comput, 40, 205, 10.1016/j.pmcj.2017.06.016 Zhang, 2019, FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial internet of things, IEEE Trans Dependable Secure Comput, 10.1109/TDSC.2019.2914117 Zhang, 2019, Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage, IEEE Trans Cloud Comput, 10.1109/TCC.2019.2944367 Sultan, 2019, Authorized keyword search over outsourced encrypted data in cloud environment, IEEE Trans Cloud Comput, 10.1109/TCC.2019.2931896 Islam, 2017, Design of a certificateless designated server based searchable public key encryption scheme, 3 Wu, 2019, Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things, Ann Telecommun, 74, 423, 10.1007/s12243-018-00701-7 Pakniat, 2019, Designated tester certificateless encryption with keyword search, Journal of Information Security and Applications, 49, 102394, 10.1016/j.jisa.2019.102394 Xu, 2012, Public-key encryption with fuzzy keyword search: aprovably secure scheme under keyword guessing attack, IEEE Trans Comput, 62, 2266, 10.1109/TC.2012.215 Li, 2015, An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services, Nonlinear Dyn, 80, 1601, 10.1007/s11071-015-1965-9 Noroozi, 2018, Comments on a chaos-based public key encryption with keyword search scheme, Nonlinear Dyn, 94, 1127, 10.1007/s11071-018-4413-9 Noroozi, 2018, Public key authenticated encryption with keyword search: revisited, IET Inf Secur, 13, 336, 10.1049/iet-ifs.2018.5315 He, 2017, Certificateless public key authenticated encryption with keyword search for industrial internet of things, IEEE Trans Ind Inf, 14, 3618, 10.1109/TII.2017.2771382 Wu, 2014, Efficient searchable ID-based encryption with a designated server, Ann Telecommun, 69, 391, 10.1007/s12243-013-0398-z Lu, 2017, Efficient designated server identity-based encryption with conjunctive keyword search, Ann Telecommun, 72, 359, 10.1007/s12243-017-0574-7 Noroozi, 2018, Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved, Ann Telecommun, 73, 769, 10.1007/s12243-018-0653-4 Li, 2019, Designated-server identity-based authenticated encryption with keyword search for encrypted emails, Inf Sci (Ny), 481, 330, 10.1016/j.ins.2019.01.004 Zhang, 2019, Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage, Inf Sci (Ny), 494, 193, 10.1016/j.ins.2019.04.051