首页 | 本学科首页   官方微博 | 高级检索  
     


Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds
Authors:Cheng Guo  Ruhan Zhuang  Yingmo Jie  Yizhi Ren  Ting Wu  Kim-Kwang Raymond Choo
Affiliation:1.School of Software Technology,Dalian University of Technology,Dalian,China;2.Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province,Dalian,China;3.School of Cyberspace,Hangzhou Dianzi University,Hangzhou,China;4.Key Laboratory of Complex Systems Modeling and Simulation, Ministry of Education of China,Hangzhou Dianzi University,Hangzhou,China;5.Department of Information Systems and Cyber Security,The University of Texas at San Antonio,San Antonio,USA;6.School of Information Technology and Mathematical Sciences,University of South Australia,Adelaide,Australia;7.School of Computer Science,China University of Geosciences,Wuhan,China
Abstract:
An effectively designed e-healthcare system can significantly enhance the quality of access and experience of healthcare users, including facilitating medical and healthcare providers in ensuring a smooth delivery of services. Ensuring the security of patients’ electronic health records (EHRs) in the e-healthcare system is an active research area. EHRs may be outsourced to a third-party, such as a community healthcare cloud service provider for storage due to cost-saving measures. Generally, encrypting the EHRs when they are stored in the system (i.e. data-at-rest) or prior to outsourcing the data is used to ensure data confidentiality. Searchable encryption (SE) scheme is a promising technique that can ensure the protection of private information without compromising on performance. In this paper, we propose a novel framework for controlling access to EHRs stored in semi-trusted cloud servers (e.g. a private cloud or a community cloud). To achieve fine-grained access control for EHRs, we leverage the ciphertext-policy attribute-based encryption (CP-ABE) technique to encrypt tables published by hospitals, including patients’ EHRs, and the table is stored in the database with the primary key being the patient’s unique identity. Our framework can enable different users with different privileges to search on different database fields. Differ from previous attempts to secure outsourcing of data, we emphasize the control of the searches of the fields within the database. We demonstrate the utility of the scheme by evaluating the scheme using datasets from the University of California, Irvine.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号