Loading web-font TeX/Main/Regular
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud | IEEE Journals & Magazine | IEEE Xplore

RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud


Abstract:

Personal e-health records (EHR) enable medical workers (e.g., doctors and nurses) to conveniently and quickly access each patient’s medical history through the public clo...Show More

Abstract:

Personal e-health records (EHR) enable medical workers (e.g., doctors and nurses) to conveniently and quickly access each patient’s medical history through the public cloud, which greatly facilitates patients’ visits and makes telemedicine possible. Additionally, since EHR involve patients’ personal privacy information, EHR holders would hesitate to directly outsource their data to cloud servers. A natural and favorite manner of conquering this issue is to encrypt these outsourced EHR such that only authorized medical workers can access them. Specifically, the ciphertext-policy attribute-based encryption (CP-ABE) supports fine-grained access over encrypted data and is considered to be a perfect solution of securely sharing EHR in the public cloud. In this paper, to strengthen the system security and meet the requirement of specific applications, we add functionalities of user revocation, secret key delegation and ciphertext update to the original ABE, and propose a revocable-storage hierarchical attribute-based encryption (RS-HABE) scheme, as the core building of establishing a framework for secure sharing of EHR in public cloud. The proposed RS-HABE scheme features of forward security (a revoked user can no longer access previously encrypted data) and backward security (a revoked user also cannot access subsequently encrypted data) simultaneously, and is proved to be selectively secure under a complexity assumption in bilinear groups, without random oracles. The theoretical analysis indicates that the proposed scheme surpasses existing similar works in terms of functionality and security, at the acceptable cost of computation overhead. Moreover, we implement the proposed scheme and present experiments to demonstrate its practicability.
Published in: IEEE Transactions on Dependable and Secure Computing ( Volume: 18, Issue: 5, 01 Sept.-Oct. 2021)
Page(s): 2301 - 2315
Date of Publication: 21 October 2019

ISSN Information:

Funding Agency:

Author image of Jianghong Wei
State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, Shaanxi, China
Jianghong Wei received the PhD degree in information security from the Zhengzhou Information Science and Technology Institute, Zhengzhou, China, in 2016. He is currently a lecturer in State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China. His research interests include applied cryptography and network security.
Jianghong Wei received the PhD degree in information security from the Zhengzhou Information Science and Technology Institute, Zhengzhou, China, in 2016. He is currently a lecturer in State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China. His research interests include applied cryptography and network security.View more
Author image of Xiaofeng Chen
State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Strategic Support Force Information Engineering University, Zhengzhou, Henan, China
Xiaofeng Chen (SM’16) received the BS and MS degrees in mathematics from Northwest University, China, in 1998 and 2000, respectively, and the PhD degree in cryptography from Xidian University, in 2003. Currently, he works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published more than 200 research papers in refereed international conferences...Show More
Xiaofeng Chen (SM’16) received the BS and MS degrees in mathematics from Northwest University, China, in 1998 and 2000, respectively, and the PhD degree in cryptography from Xidian University, in 2003. Currently, he works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published more than 200 research papers in refereed international conferences...View more
Author image of Xinyi Huang
State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, Shaanxi, China
Xinyi Huang received the PhD degree from the School of Computer Science and Software Engineering, University of Wollongong, Australia, in 2009. He is currently a professor with the College of Mathematics and Informatics, Fujian Normal University, China. His research interests include cryptography and information security. He has published more than 160 research papers in refereed international conferences and journals, su...Show More
Xinyi Huang received the PhD degree from the School of Computer Science and Software Engineering, University of Wollongong, Australia, in 2009. He is currently a professor with the College of Mathematics and Informatics, Fujian Normal University, China. His research interests include cryptography and information security. He has published more than 160 research papers in refereed international conferences and journals, su...View more
Author image of Xuexian Hu
State Key Laboratory of Cryptology, Beijing, China
Xuexian Hu received the PhD degree in information security from the Zhengzhou Information Science and Technology Institute, Zhengzhou, China, in 2009. He is a lecturer with the State Key Laboratory of Mathematical Engineering and Advanced Computing. His current research interests include applied cryptography, network security.
Xuexian Hu received the PhD degree in information security from the Zhengzhou Information Science and Technology Institute, Zhengzhou, China, in 2009. He is a lecturer with the State Key Laboratory of Mathematical Engineering and Advanced Computing. His current research interests include applied cryptography, network security.View more
Author image of Willy Susilo
School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China
Willy Susilo (SM’01) received the PhD degree in computer science from the University of Wollongong, Australia. He is a professor and head of School of Computing and Information Technology and the director of Institute of Cybersecurity and Cryptology (iC^22) at the University of Wollongong. He was awarded the prestigious Australian Research Council (ARC) Future fellow. His main research interests include cryptography and...Show More
Willy Susilo (SM’01) received the PhD degree in computer science from the University of Wollongong, Australia. He is a professor and head of School of Computing and Information Technology and the director of Institute of Cybersecurity and Cryptology (iC^22) at the University of Wollongong. He was awarded the prestigious Australian Research Council (ARC) Future fellow. His main research interests include cryptography and...View more

Author image of Jianghong Wei
State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, Shaanxi, China
Jianghong Wei received the PhD degree in information security from the Zhengzhou Information Science and Technology Institute, Zhengzhou, China, in 2016. He is currently a lecturer in State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China. His research interests include applied cryptography and network security.
Jianghong Wei received the PhD degree in information security from the Zhengzhou Information Science and Technology Institute, Zhengzhou, China, in 2016. He is currently a lecturer in State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China. His research interests include applied cryptography and network security.View more
Author image of Xiaofeng Chen
State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Strategic Support Force Information Engineering University, Zhengzhou, Henan, China
Xiaofeng Chen (SM’16) received the BS and MS degrees in mathematics from Northwest University, China, in 1998 and 2000, respectively, and the PhD degree in cryptography from Xidian University, in 2003. Currently, he works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published more than 200 research papers in refereed international conferences and journals. His work has been cited more than 7000 times at Google Scholar. He is in the Editorial Board of the IEEE Transactions on Dependable and Secure Computing, Security and Privacy, and Computing and Informatics (CAI) etc. He has served as the program/general chair or program committee member in more than 30 international conferences. He is a senior member of the IEEE.
Xiaofeng Chen (SM’16) received the BS and MS degrees in mathematics from Northwest University, China, in 1998 and 2000, respectively, and the PhD degree in cryptography from Xidian University, in 2003. Currently, he works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published more than 200 research papers in refereed international conferences and journals. His work has been cited more than 7000 times at Google Scholar. He is in the Editorial Board of the IEEE Transactions on Dependable and Secure Computing, Security and Privacy, and Computing and Informatics (CAI) etc. He has served as the program/general chair or program committee member in more than 30 international conferences. He is a senior member of the IEEE.View more
Author image of Xinyi Huang
State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, Shaanxi, China
Xinyi Huang received the PhD degree from the School of Computer Science and Software Engineering, University of Wollongong, Australia, in 2009. He is currently a professor with the College of Mathematics and Informatics, Fujian Normal University, China. His research interests include cryptography and information security. He has published more than 160 research papers in refereed international conferences and journals, such as ACM CCS, the IEEE Transactions on Computers, the IEEE Transactions on Parallel and Distributed Systems, and the IEEE Transactions on Information Security and Forensics. His work has been cited more than 6200 times at Google Scholar. He is in the editorial Board of International Journal of Information Security and Science China Information Sciences. He has served as the program/general chair or program committee member in more than 120 international conferences.
Xinyi Huang received the PhD degree from the School of Computer Science and Software Engineering, University of Wollongong, Australia, in 2009. He is currently a professor with the College of Mathematics and Informatics, Fujian Normal University, China. His research interests include cryptography and information security. He has published more than 160 research papers in refereed international conferences and journals, such as ACM CCS, the IEEE Transactions on Computers, the IEEE Transactions on Parallel and Distributed Systems, and the IEEE Transactions on Information Security and Forensics. His work has been cited more than 6200 times at Google Scholar. He is in the editorial Board of International Journal of Information Security and Science China Information Sciences. He has served as the program/general chair or program committee member in more than 120 international conferences.View more
Author image of Xuexian Hu
State Key Laboratory of Cryptology, Beijing, China
Xuexian Hu received the PhD degree in information security from the Zhengzhou Information Science and Technology Institute, Zhengzhou, China, in 2009. He is a lecturer with the State Key Laboratory of Mathematical Engineering and Advanced Computing. His current research interests include applied cryptography, network security.
Xuexian Hu received the PhD degree in information security from the Zhengzhou Information Science and Technology Institute, Zhengzhou, China, in 2009. He is a lecturer with the State Key Laboratory of Mathematical Engineering and Advanced Computing. His current research interests include applied cryptography, network security.View more
Author image of Willy Susilo
School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China
Willy Susilo (SM’01) received the PhD degree in computer science from the University of Wollongong, Australia. He is a professor and head of School of Computing and Information Technology and the director of Institute of Cybersecurity and Cryptology (iC^22) at the University of Wollongong. He was awarded the prestigious Australian Research Council (ARC) Future fellow. His main research interests include cryptography and information security. His main contribution is in the area of digital signature schemes. He has served as a program committee member in dozens of international conferences. He has published numerous publications in the area of digital signature schemes and encryption schemes. He is a senior member of the IEEE.
Willy Susilo (SM’01) received the PhD degree in computer science from the University of Wollongong, Australia. He is a professor and head of School of Computing and Information Technology and the director of Institute of Cybersecurity and Cryptology (iC^22) at the University of Wollongong. He was awarded the prestigious Australian Research Council (ARC) Future fellow. His main research interests include cryptography and information security. His main contribution is in the area of digital signature schemes. He has served as a program committee member in dozens of international conferences. He has published numerous publications in the area of digital signature schemes and encryption schemes. He is a senior member of the IEEE.View more
Contact IEEE to Subscribe

References

References is not available for this document.