4.4 Article

Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation

期刊

出版社

SPRINGER
DOI: 10.1007/s10207-014-0270-9

关键词

Personal health records; Cloud computing; Data privacy; Fine-grained access control; Attribute-based encryption

资金

  1. National Natural Science Foundation of China [61272542, 61300213]
  2. Fundamental Research Funds for the Central Universities [2013B07014]

向作者/读者索取更多资源

Personal health record (PHR) service is an emerging model for health information exchange. In PHR systems, patient's health records and information are maintained by the patient himself through the Web. In reality, PHRs are often outsourced to be stored at the third parties like cloud service providers. However, there have been serious privacy concerns about cloud service as it may expose user's sensitive data like PHRs to those cloud service providers or unauthorized users. Using attribute-based encryption (ABE) to encrypt patient's PHRs in cloud environment, secure and flexible access control can be achieved. Yet, problems like scalability in key management, fine-grained access control, and efficient user revocation remain to be addressed. In this paper, we propose a privacy-preserving PHR, which supports fine-grained access control and efficient revocation. To be specific, our scheme achieves the goals (1) scalable and fine-grained access control for PHRs by using multi-authority ABE scheme, and (2) efficient on-demand user/attribute revocation and dynamic policy update. In our scheme, we consider the situation that multiple data owners exist, and patient's PHRs are encrypted and stored in semi-trust servers. The access structure in our scheme is expressive access tree structure, and the security of our scheme can be reduced to the standard decisional bilinear Diffie-Hellman assumption.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Full Verifiability for Outsourced Decryption in Attribute Based Encryption

Jiguo Li, Yao Wang, Yichen Zhang, Jinguang Han

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Information Systems

Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage

Jiguo Li, Hao Yan, Yichen Zhang

Summary: Cloud storage service offers an efficient way for data sharing within a group, but ensuring data integrity requires RDPC protocols. Traditional PKI-based RDPC protocols have security flaws and certificate management burden, leading to the adoption of IBC for its basis, despite the key escrow issue. To address these challenges, a new RDPC protocol is proposed using certificateless signature technique to eliminate the need for certificates and key escrow problems.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Hardware & Architecture

ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack

Jiguo Li, Min Wang, Yang Lu, Yichen Zhang, Huaqun Wang

Summary: To ensure security and privacy in cloud data storage, attribute-based keyword search (ABKS) allows data owners to upload encrypted data and authorize specific users to retrieve it. However, the vulnerability to keyword guessing attacks is a key issue, which is addressed in this paper by using data owner's private key to sign keywords and prevent unauthorized keyword generation. The proposed ABKS scheme is secure against chosen-plaintext attacks and demonstrates practical performance.

COMPUTER STANDARDS & INTERFACES (2021)

Article Computer Science, Information Systems

Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage

Jiguo Li, Hao Yan, Yichen Zhang

Summary: This article proposes a new Identity-based RDIC scheme that utilizes a homomorphic verifiable tag to reduce system complexity, while also masking original data with random integer addition to protect data privacy. The scheme is proven to be secure under the assumption of computational Diffie-Hellman problem and is shown to be efficient and feasible for real-life applications through experiment results.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting

Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Jiguo Li, Hongwei Li, Jianfeng Ma

Summary: CP-ABKS system enables search queries and fine-grained access control over encrypted data in the cloud, but lacks effective support for shared multi-owner settings and privacy protection. The proposed ABKS-SM systems emphasize privacy preservation and malicious user tracing, with features of selective security and resistance to offline keyword-guessing attacks.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Automation & Control Systems

Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs

Yang Lu, Jiguo Li, Fen Wang

Summary: Industrial IoT (IIoT) is an practical application of the Internet of Things (IoT) in modern industry that accelerates industrial development. The recent certificate-based encryption with keyword search (CBEKS) scheme aims to address data privacy protection in the cloud, showing advantages in computation performance and security against keyword guessing attacks.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Artificial Intelligence

An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors

Wenjuan Li, Lishan Ke, Weizhi Meng, Jinguang Han

Summary: The Internet of Things (IoT) is adopted by many organizations for information collection and sharing. Malicious emails are a security challenge for IoT systems, and email classification using machine learning is a key solution. Empirical research shows that LibSVM and SMO-SVM perform better in email classification.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Information Systems

An efficient identity-based signature scheme with provable security

Peng Yi, Jiguo Li, Chengdong Liu, Jinguang Han, Huaqun Wang, Yichen Zhang, Yu Chen

Summary: This paper introduces an efficient identity-based signature scheme that is proved secure under the standard model. The scheme's security is reduced to the well-known computational Diffie-Hellman assumption, and it outperforms related schemes in terms of computation cost for signing and verification.

INFORMATION SCIENCES (2021)

Editorial Material Computer Science, Information Systems

Security, Trust, and Privacy in Machine Learning-Based Internet of Things

Weizhi Meng, Wenjuan Li, Jinguang Han, Chunhua Su

SECURITY AND COMMUNICATION NETWORKS (2022)

Article Computer Science, Information Systems

Decentralized Attribute-Based Server-Aid Signature in the Internet of Things

Jiguo Li, Yu Chen, Jinguang Han, Chengdong Liu, Yichen Zhang, Huaqun Wang

Summary: Devices of Internet of Things (IoT) generate a large amount of data, which poses secure authentication and access control challenges. Attribute-based signature (ABS) provides privacy-preserving access control and data authentication by signing a message over a set of attributes. Existing multiauthority ABS schemes face risks when the central authority is compromised and require expensive operations for resource-limited devices. To address these issues, a decentralized attribute-based server-aid signature (DABSAS) scheme is proposed, which offers anonymity, unforgeability, and alleviates the burden of signature and verification. The scheme is proven secure under the co-CDH assumption and demonstrates efficiency compared to existing schemes.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Redactable Signature-Based Public Auditing Scheme With Sensitive Data Sharing for Cloud Storage

Song Li, Jinguang Han, Deyu Tong, Jie Cui

Summary: To ensure the integrity of data stored in a cloud server, data owners need to use public auditing techniques. However, if data is modified dynamically during the data anonymization process, the auditing result becomes invalid. Therefore, we propose a new scheme based on redactable signatures, which allows direct transformation of signatures when sharing sensitive data, without the need for additional data sanitizers.

IEEE SYSTEMS JOURNAL (2022)

Article Computer Science, Information Systems

Efficient Attribute Based Server-Aided Verification Signature

Yu Chen, Jiguo Li, Chengdong Liu, Jinguang Han, Yichen Zhang, Peng Yi

Summary: The study introduced a novel Attribute Based Signature (ABS) scheme using attribute tree as access policy for flexible access control and employing server-aid technique to reduce computation burden of the verifier. This scheme is proven secure against chosen-policy selective-message attack in the standard model and is more efficient in private key generation and verification compared to existing schemes.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Multiauthority Attribute-Based Encryption for Assuring Data Deletion

Jiguo Li, Ruyuan Zhang, Yang Lu, Jinguang Han, Yichen Zhang, Wenzheng Zhang, Xinfeng Dong

Summary: In this article, the concept of multiauthority attribute-based encryption (MA-ABE) is introduced, and a scheme for assuring data deletion is designed. The scheme not only addresses the key escrow issue, but also prevents collusion attacks between malicious and unauthorized users.

IEEE SYSTEMS JOURNAL (2023)

Article Computer Science, Information Systems

Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing

Jiguo Li, Ningyu Chen, Yichen Zhang

Summary: In this paper, an efficient extended file hierarchy CP-ABE scheme (EFH-CP-ABE) is proposed to encrypt multiple files on the same access level for secure cloud storage. This scheme is practical and beneficial for big institutions or companies that have many hierarchical sectors.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)

暂无数据