A Lightweight,Searchable,and Controllable EMR Sharing Scheme
2024-05-25XiaohuiYangandPeiyinZhao
Xiaohui Yang and Peiyin Zhao
School of Cyber Security and Computer,Hebei University,Baoding,071000,China
ABSTRACT Electronic medical records(EMR)facilitate the sharing of medical data,but existing sharing schemes suffer from privacy leakage and inefficiency.This article proposes a lightweight,searchable,and controllable EMR sharing scheme,which employs a large attribute domain and a linear secret sharing structure(LSSS),the computational overhead of encryption and decryption reaches a lightweight constant level,and supports keyword search and policy hiding,which improves the high efficiency of medical data sharing.The dynamic accumulator technology is utilized to enable data owners to flexibly authorize or revoke the access rights of data visitors to the data to achieve controllability of the data.Meanwhile,the data is re-encrypted by Intel Software Guard Extensions(SGX)technology to realize resistance to offline dictionary guessing attacks.In addition,blockchain technology is utilized to achieve credible accountability for abnormal behaviors in the sharing process.The experiments reflect the obvious advantages of the scheme in terms of encryption and decryption computation overhead and storage overhead,and theoretically prove the security and controllability in the sharing process,providing a feasible solution for the safe and efficient sharing of EMR.
KEYWORDS Lightweight;keyword search;large attribute domain;controllability;blockchain
1 Introduction
In today’s information age,data is considered an important asset[1].However,in the healthcare sector,the secure and efficient sharing of electronic medical records has always been a challenge.Since 2020,the cost of healthcare data breaches has increased by 53.3%,and for the 13th consecutive year,the healthcare industry has reported the most costly data breaches with an average loss of $10.93 million[2].Healthcare data contains a large amount of private information such as patients’identity and medical history,which can pose serious security risks to patients if compromised [3].However,electronic healthcare data sharing has become a key trend in healthcare.Most patients are willing to share their personal medical data under the premise of ensuring patient privacy and data security[4].The Healthcare Medical Data Compliance Circulation Standard provides a regulatory framework for healthcare data circulation[5],which is a major advancement in healthcare data circulation.
Medical data includes sensitive data such as medical history and personal health information.Once illegally accessed,it not only violates personal privacy,but also may lead to serious consequences such as identity theft.At the same time,the rights and interests of data owners cannot be safeguarded due to the lack of sufficient trust between data owners and data visitors.Therefore,it is very important to ensure the rights and interests of the data owner and privacy,while at the same time achieve efficient access to e-medical data by data visitors.On the basis of CP-ABE,Zheng et al.[6] proposed the ciphertext policy-based keyword searchable attribute-based encryption (CP-ABKS) scheme,which allows to retrieve the encrypted documents through keyword search while maintaining fine-grained access control,but the use of a tree structure is less efficient and cannot achieve the resistance to the keyword guessing attack,and also the data owner’s controllability over the data,thus effectively guaranteeing the data owner’s rights and privacy while ensuring the data visitor’s efficient access to the electronic medical data.Zhang et al.[7] proposed a partial policy hiding scheme against attribute value guessing attack using interactive online privacy protection test,which can resist offline dictionary guessing attack,but with low efficiency and no controllability of data by data owner.Li et al.[8]realized data sharing based on proxy re-encryption,and at the same time,realized a certain controllability of data by data owner.The data sharing is based on proxy re-encryption technique,while the data owner has some control over the data,and the blockchain is used to verify the user privileges and record the request content to achieve a certain degree of regulatory control,but the scheme is not able to resist the offline dictionary guessing attack,and the sharing efficiency also needs to be improved.In order to promote efficient and secure sharing of healthcare data,new technologies and strategies must be used to address these issues.
To address the above problems,this paper proposes a lightweight,searchable,and controllable EMR sharing scheme,which utilizes a large attribute domain and a linear secret sharing structure to improve the flexibility and efficiency of medical data sharing,reduces the encryption and decryption overhead of the medical data during the sharing process,and decrypts the ciphertext with a constant level of computation.Using Intel SGX technology,a secure container Enclave is opened in the system to re-encrypt the data and change the structure of the data,thus realizing the resistance to offline dictionary guessing attacks and avoiding the interaction of data visitors in the server during the search process.Adopting dynamic accumulator technology,the data owner can flexibly manage authorized users,including the update and revocation of privileges,etc.,which enhances the owner’s controllable degree of its own data.The summary and Hash of the access rows of the data visitors are uploaded to the blockchain,and by using the characteristics of blockchain such as tampering,the regulation can trace the request process of the data,and carry out credible judgments and pursuing responsibilities when there is anomalous behavior.The main contributions of this paper are summarized as follows.
The solution adopts the LSSS structure and supports large attribute domains,which further improves the flexibility and efficiency of the existing solution and can be adapted to devices with limited computing resources.
The application of Intel SGX further guarantees the security of the data sharing process.
The combination of dynamic accumulator technology and blockchain technology further increases the rights and interests of data owners in the sharing process.
The paper is organized as follows.The second part presents the related research work.The third part provides the basics of the theoretical model.The fourth part first introduces the design of the scheme and details the key processes such as algorithms in the scheme.The fifth part is the security analysis of the scheme.The sixth part is the experimental verification and analysis.Finally,the seventh part summarizes and discusses.
2 Related Work
In recent years,the emergence of emerging technologies such as Deep Learning [9],Edge Computing[10]and Knowledge Graphs[11]has contributed significantly to the research on efficient sharing of data.In sensitive domains such as electronic medical record sharing,fine-grained data access control mechanisms are required.However,some traditional searchable encryption(SE)schemes do not support fine-grained access control[12].In this context,Attribute-Based Encryption(ABE)[13]has been proposed as an effective solution to achieve finer-grained access control.Sun et al.[14]extended this concept and implemented a verifiable CP-ABKS scheme in a multiuser environment,which supports user revocation and is resistant to keyword guessing Attacks.Access policies may reveal sensitive information about the data owner,which makes it crucial to hide the access policies,but none of the above schemes support policy hiding.Nishide et al.[15]proposed a wildcard-based scheme for policy hiding,but it only supports the“and gate”structure,which makes it more demanding and less flexible in terms of computing resources.However,only the“and gate”structure is supported,which makes it more demanding on computational resources and less flexible.In order to overcome these limitations,Lai et al.[16] proposed a more flexible partial policy hiding scheme based on ensemble groups using Linear Secret Sharing Scheme(LSSS),but this scheme also does not support keyword search.
Qiu et al.[17] proposed a new CP-ABKS scheme that supports policy hiding with resistance to keyword guessing attacks and effectively restricts the possibility of unauthorized users to perform searches,but there is a lack of research on data encryption.Based on this,Wang et al.[18]proposed a data owner attribute-based encryption scheme with policy hiding that can be searched and revoked to enable data sharing by multiple owners.Miao et al.[19] proposed a keyword search scheme with privacy preservation and support for multi-owner cooperation that supports policy hiding and user tracking.However,schemes [17–19] are based on the partial policy hiding implemented in Nishide et al.’s[15]scheme,with low flexibility and scalability of access control,and none of them can resist offline dictionary guessing attacks.Ma et al.[20]proposed an innovative EMR access control model and fine-grained data sharing mechanism for resource-constrained mobile devices,and addressed challenges of data privacy protection and challenges such as computational efficiency optimization,but fails to achieve controllability of data by the data owner.The DNACDS scheme proposed by Singh et al.[21] and the LBP-RDH technique proposed by Sahu et al.[22] also provide some new ideas for healthcare data security and sharing.
While improving the efficiency of healthcare data access control,the controllability of the data flow of the data owner’s data during the sharing process is equally important.Since the emergence of Bitcoin in 2009,its underlying blockchain technology has gradually received attention from the research field of healthcare data sharing controllability due to its characteristics.Xia et al.[23]proposed MeDShare,a healthcare data management system in a trustless environment,where data manipulation behaviors are logged and user permissions are managed,but there is a high overhead in verifying user permissions.Gao et al.[24]designed a blockchain-based medical data sharing scheme using searchable encryption and secret sharing techniques.The scheme takes into account the problem that cloud storage servers are not fully trusted and uses secret sharing techniques to support sharing by multiple users,but the interaction process of the scheme is relatively complex and the system coupling is relatively high.Sun et al.[25]proposed a blockchain-and smart contract technology based distributed electronic searchable scheme for medical data,which achieves decentralization of data storage and fine-grained control of data access,and at the same time adopts an attribute-based encryption scheme to ensure data privacy,but the system efficiency needs to be further improved.Wu et al.[26]proposed a blockchain-based smart healthcare system,which has fine-grained privacy protection,and can reliably exchange and share data among different users but cannot resist offline dictionary guessing attacks.
Zhou et al.[27] designed a sharing scheme for healthcare data by combining attribute-based encryption and blockchain technology from access control in the time dimension.Although a regulatory center is set up to manage the user’s identity,there is little flexibility to restrict data sharing from the time dimension.Chelladurai et al.[28]used blockchain smart contracts to provide a secure,efficient and seamless solution to support healthcare information exchange and peer-to-peer contracts with cryptographic hash functions to ensure high security and integrity,but the user cannot achieve effective data control.Lin et al.[29] proposed the UDVSP scheme and the EMRChain system to achieve efficient and secure blockchain-based EMR sharing with bilinear unpaired and anti-malicious propagation,which was demonstrated through a comprehensive performance evaluation shows that these schemes are feasible,but cannot resist offline dictionary guessing attacks.Gao et al.[30]proposed a blockchain-based searchable encryption scheme that implements fine-grained access control and EHR sharing on the cloud,ensuring data integrity and fairness of transactions,while resisting adaptive keyword selection attacks,but with poor data controllability for the data owner.
Based on the above statement,the current scheme does not simultaneously weigh the relationship between efficient encryption and decryption of medical data and sharing and the effective controllability of data owners’data,therefore,in this paper,we propose a lightweight searchable and controllable electronic medical record sharing scheme,which adopts the large attribute domain,the LSSS structure,and the Intel SGX technology to realize the function of keyword search,policy hiding,and offline dictionary guessing attack.The keyword search,strategy hiding and offline dictionary guessing attack functions,which improve the sharing efficiency and ensure the security of the data at the same time;through the combination of dynamic accumulator technology and blockchain technology,it is to realize the controllability of the data by the data owner and the credible judgment and accountability of the regulator,which fully protects the rights and interests of the data owner.
3 Preliminaries
3.1 Composite Order Bilinear Group
Apply a bilinear group of composite orderQ=p1p2p3,wherep1,p2andp3are three different prime numbers.GandGTare two multiplicative cyclic groups of orderQ=p1p2p3.is a subgroup ofGwith orderpi,and(i/=j)is a subgroup ofGwith orderpipj.The bilinear mappinge:G×G→GTsatisfies the following properties:
1) Bilinearity:for anyu,v∈Ganda,b∈Zp,hase=e(u,v)ab.
2) Non-degeneracy:there existsg∈Gsuch that the order ofe(g,g)inGTisQ.
3) Computability:for anyu,v∈G,there exists an efficient algorithm to computee(u,v).
4) Orthogonality of subgroups:for ∀gi∈and ∀gj∈(i/=j),hase=1.
3.2 Access Structure
In order to achieve effective control of the data owner over the data visitor,it is necessary to customize the access authorization set,which is satisfied to continue access,otherwise access is denied.Let {P1,P2,···,Pn} be a set of entities comprisingnparticipants.For setA⊆,if ∀B,CwhereB∈AandB⊆C,hasC∈A,thenAis said to be monotone.IfAis a non-empty subset of{P1,P2,···,Pn},that is,A⊆{∅},thenAis considered an access structure.All sets included inAare termed as authorized sets,and those not included inAare termed as non-authorized sets.
3.3 Intel SGX
Intel SGX is an extension of the existing Intel architecture,comprising a new set of instruction sets and memory access mechanisms [31] that allow applications to create an isolated execution environment known as an Enclave.An Enclave serves as a trusted and secure entity for storing data and executing code.It possesses three key security features:Isolation,sealing,and attestation[32].The feature of isolation restricts access to a protected area of memory hardware to only specific Enclaves.The encryption is performed using a sealing key that is private to a specific Enclave,and no process other than an exact replica of the Enclave is able to decrypt or modify it.Attestation allows verifiers to authenticate that the code is running securely within an Enclave and has not been tampered with.SGX offers two types of attestation:Local and remote[33].Local attestation is used for authentication between two Enclaves on the same platform,where they can derive a shared key using a root sealing key shared between them.Remote attestation enables an Enclave to generate reports that can be verified by any remote entity.
4 Scheme Design
4.1 Scheme Overview
The lightweight searchable and controllable electronic medical record sharing scheme(EMR_LSC SS) designed in this paper is shown in Fig.1.The system mainly includes six participating entities:Cloud Server (CS),Regulatory and Authorization Center (RAC),Data Owner (DO),Data Visitor(DV),Blockchain(BC),and Enclave.
4.2 Specific Algorithm Processes
The scheme presented in this article primarily comprises algorithms for System initialization,Key generation,Accumulator initialization,Encryption,Re-encryption,Search request,Authorization search,Search token generation,Search and Decryption.The symbol description is shown in Table 1 and specific algorithmic processes are as follows.
Table 1: Symbol description table
1.Key generation algorithm.This algorithm is executed by RAC.
2.Accumulator initialization algorithm.This algorithm is executed by DO.
3.Encryption algorithm.This algorithm is executed by DO.
4.Re-Encryption algorithm.This algorithm is executed by Enclave.
5.Search request algorithm.This algorithm is executed by DV.
6.Authorization search algorithm.This algorithm is executed by DO.
7.Search token generation algorithm.This algorithm is executed by DV.
8.Search algorithm.This algorithm is executed by CS.
9.Decryption algorithm.This algorithm is executed by DV.
5 Security Analysis of the Scheme
The scheme has the ability to resist offline dictionary guessing attacks and is controllable by the data owner.This section proves its security.
5.1 Proof of Security against Offline Dictionary Guessing Attacks
Offline Dictionary Guessing Attacks generally target keywords or attribute values.In this paper’s solution,the keywords and attribute values are included in the keyword index and the search tokens.Therefore,the following will provide a security analysis for resistance to Offline Dictionary Guessing Attacks from the perspectives of the keyword index and search tokens.In this context,the CS acts as the attacker,with the attributes{ci,vi}and keywordsKwiall being elements from the offline dictionary.
Assumption 1:CDH(Computational Diffie-Hellman problem)Assumption
Let us presume a multiplicative cyclic groupGwith its order being a prime numberp,andgbeing a generator of the cyclic groupG.Calculation parametersa,b∈Zpare selected randomly.The CDH assumption can be understood as:It is quite difficult to solvegabthroughgaandgb.
Theorem 1:If the CDH assumption holds,then the scheme proposed in this paper can resist offline dictionary guessing attacks based on keywords and indices.
Theorem 2:The scheme proposed in this paper can resist offline dictionary attacks directed at search tokens.
According to the above proof it can be seen that the attacker finds a polynomial in polynomial time and puts the keywords and attribute values from the offline dictionary into the discriminant in order to check whether the discriminant is valid or not,and it turns out that the discriminant is invalid,so this paper’s scheme is resistant to offline dictionary guessing attack security.
5.2 Proof of Security for Data Owner’s Control over Their Data
Assumption 2:Given the fulfillment of the following conditions,the data owner has controllability over their own data,that is,the scheme proposed in this paper offers data controllability security.
In the aforementioned equation,f(μ)is a negligible function,implying that the probability of DV not receiving authorization from DO is approaching 1.
Theorem 3:During the process in which the data visitor requests the data owner for data sharing,only those data visitors authorized by the data owner can obtain the corresponding data.That is,the data owner has controllability over personal data.
Based on the above proof,it can be seen that DO can control the flow of its own data,i.e.,it can flexibly authorize data access to other DVs or revoke the authorization to a certain DV to ensure the controllability of its own data.
6 Performance Analysis of the Scheme
6.1 Experimental Environment
In order to gain a more intuitive understanding of the performance of the proposed scheme,this simulation experiment uses Java language and calls a third-party Java pairing based encryption(JPBC)library to simulate some of the algorithms in this scheme.The experimental environment configuration is shown in Table 2.
Table 2: Experimental environment configuration
In this paper,an extension of the Type A elliptic curve characterized by the equationy2=x3+xis employed for simulative experiments.The encrypted Electronic Medical Record dataset utilized is the COVID-19 Dataset [34],which is provided by the Mexican government and comprises a vast amount of anonymized patient-related information,including preexisting conditions.The original dataset consists of 21 unique features and 1,048,576 unique patients.During simulation experiments,the range of attribute numbersnand the number of rows in the matrixIwere both set within the interval[0,50],with the number of candidate values per attributeniset as 5.
6.2 Function Analysis
This section compares the seven functions of keyword search and large attribute domains,resistance to offline dictionary guessing attacks,constant decryption overhead,access structure,controllability,and trusted accountability with the schemes of Miao et al.[19],Zhang et al.[7],and Gao et al.[30].The comparison results are shown in Table 3.
Table 3: Function comparison table
The comparative results presented in the table above allow for the following conclusions.Firstly,the scheme by Miao solely supports keyword search functionality,with an access structure that employs an AND-gate paradigm.Notably,the decryption overhead in their scheme is closely linked to the count of data owners and collaborating parties,which makes it impossible to achieve a constant decryption cost.Secondly,Zhang,despite supporting a vast attribute space and the incorporation of a LSSS structure,and endowing the capability to withstand offline dictionary guessing attacks,exhibit a decryption overhead similar to that of Miao.This cost is not constant either but varies with the number of user attributes.Lastly,Gao have accomplished fine-grained access control and sharing of EMR in the cloud,albeit lacking in mechanisms to counteract offline dictionary attacks and in providing data owners with the power of control.
This study takes into consideration the advantages of the aforementioned schemes and incorporates technologies such as dynamic accumulators and blockchain.By utilizing these technologies,ensure controllability by data owners over data access and accountable trustworthiness,all the while fulfilling the requirement for low computational resource overhead.Compared to the previous schemes,the proposal in this paper exhibits significant merits.
6.3 Computational Overhead
Drawing on the comparative experiments of Miao and Zhang,this section will evaluate the computational cost of some algorithm processes in this paper through theoretical and simulation experiments.By conducting 500 tests and taking the average,the specific unit time results are shown in Table 4.
Table 4: Computational cost per unit for common cryptographic algorithms
1)The computational overheads of the proposed scheme in comparison to other schemes during system initialization,key generation,encryption,and shared decryption phases are delineated in Table 5 below.Within this context,nidenotes the number of candidates per attribute,nrepresents the number of attributes,Icorresponds to the number of rows in the access matrix,and d signifies the number of collaborators of the data owner.During the system initialization phase,the computational overhead for Miao is related to both the number of system attributesnand the number of candidate values per attributeni.In contrast,the proposed scheme in this paper,akin to that of Zhang,is predicated upon a large attribute space,hence the computation overhead remains a constant at a constant-time complexity,which is significantly less than that of Miao.
Table 5: Computational overhead comparison
Moreover,the computational overhead of the scheme presented in this paper is also marginally lower than that of Zhang.In the key generation phase,the computational overhead of our scheme is reduced by at leastnE1compared to other benchmark schemes.The encryption phase of the scheme under consideration includes both data and index encryption.The computational overhead of Miao is contingent upon the number of collaboratorsdof the data owner,which diverges from the focus of our scheme.Relative to Zhang,the encryption cost of our scheme is approximately 2IE1lower.During the search token generation stage,the computational overhead of our approach is comparable to that of other schemes.
Owing to the adoption of LSSS structure within the scheme proposed in this article,the reconstruction of the secret values entails exponential operations,thus rendering the computational overhead during the search phase of our scheme relatively higher compared to that of Zhang.Nevertheless,the computational overhead ofETis marginal;therefore,the additional overhead introduced in the search phase is deemed acceptable.Ultimately,in the decryption phase,the computational cost of the scheme by Zhang.is contingent upon the number of user attributesn,whereas the overhead of the scheme elucidated in this work is fixed at a constant-time complexity,which confers a considerable advantage.
The scheme from Miao involves the number of data owner’s collaboratorsdduring the encryption,key generation,and decryption phases.However,this variable is not included in the scheme presented in this paper and that of Zhang For ease of comparison between the schemes,d=1,and then a comparison is performed.
The temporal overhead associated with system initialization is depicted in Fig.2.During the system initialization phase,the time overhead of the scheme proposed by Miao exhibits a linear growth trend with respect to the number of attributes m.In contrast,the time overhead for the scheme presented in this paper as well as that by Zhang remains constant,with notably lower expenses.
The encryption time overhead is illustrated in Fig.3.During the encryption phase,the time overhead for the schemes proposed by Miao and Zhang both display an exponential growth as a function of the increase in the number of rows I in the sharing matrix.Although the time overhead for the scheme presented in this paper also rises with an increase in the number of rows I,under the stipulated assumptions,the rate of increase for this paper’s scheme is substantially slower than that of Zhang,and is only slightly higher than that of Miao.Furthermore,considering that the cooperating number of data owners d is a relatively large value,and not merelyd=1,in practical scenarios,the growth rate of Miao would be much faster than that of the scheme proposed in this paper.
Figure 2: System initialization time overhead
Figure 3: Encryption time overhead
The temporal overhead of the key generation phase is depicted in Fig.4.Although the scheme in this paper grows linearly with the schemes of Miao and Zhang,the growth rate is significantly lower than that of Miao and Zhang.
The decryption time overhead is illustrated in Fig.5.The program of Miao has a significantly higher growth rate than the program in this paper.Although the time overhead for Zhang is a relatively small constant when the variable d is presumed to be a constant value of one,in practical scenarios,d is often significantly greater than this value.In contrast,the decryption time overhead of the scheme presented within this paper remains constant and invariant.Consequently,in comparison,the computation during this phase is more efficient in the approach proposed by this study.
Figure 4: Key generation time overhead
Figure 5: Decryption time overhead
As discerned from Table 6.During the system initialization phase,when n=50,the time overhead for the scheme by Miao amounts to 2801.6 ms,for Zhang,it is 40.7 ms,whereas for the scheme proposed in this paper it accounts for 30.9 ms.Consequently,the scheme proposed in this paper demonstrates a significant advantage during the system initialization stage.In the key generation phase,the scheme proposed by Miao incurs a time expense of 1179.5 ms,while that of Zhang amounts to 1173.5 ms,with both exhibiting comparable temporal overheads.In contrast,the scheme presented in this paper demonstrates a significantly reduced time consumption of 624.1 ms,markedly outperforming the approaches of Miao and Zhang.In the encryption stage,when I=50,the time overhead for the scheme proposed in this paper is 1605.2 ms,for Miao it is 1198.7 ms,and for the scheme of Zhang it is 2878.9 ms.In actual scenarios,the scheme presented in this paper holds a distinct advantage in terms of time overhead.In the decryption stage,the time overhead associated with Zhang exhibits a noticeable increase with the addition of attributes.Under the assumption of specific conditions,the time overhead for the scheme by Miao is 32.1 ms,while that for Zhang and colleagues’scheme is 698.7 ms,and the approach introduced in this article incurs a time expense of 38.1 ms,has a clear advantage.
Table 6: Stage time cost
In terms of the search token generation and search time overhead,a comparison is drawn between the scheme presented in this paper and that of Miao,as the scheme by Zhang does not incorporate these two stages.The temporal overhead during the search phase is comparable between the two approaches;however,in the phase of search token generation,the scheme of Miao almost doubles the time expense of the scheme proposed in this article.Therefore,the approach delineated herein proves to be more efficient in both of these stages.
In the stages of re-encryption,accumulator initialization,search requests,and authorization requests,the scheme proposed in this paper adds several functionalities compared to the schemes by Miao and Zhang.Through logical analysis and simulation experiments,these additional functionalities are deemed to be within a reasonable range.
6.4 Storage Overhead
This section will analyze the partial overhead associated with the proposed scheme in the context of non-blockchain storage.Herein,|G1|denotes the size of elements in the groupG1,and similarly,|G2|,|GT|andrepresent the sizes of elements in the groupsG2,GTandZp,respectively.Under the elliptic curve defined by the equationy2=x3+x,it holds that |G1|=|G2|=|GT|.Due to functional discrepancies between the scheme introduced in this paper and those by Miao and Zhang,a comparative assessment of storage overhead is limited to five key aspects:System public keys,system master keys,private keys,search tokens,and encrypted indexes—specifically,ciphertexts associated with indexes.The outcomes are tabulated in Table 7.
Table 7: Storage overhead
Lastly,for the storage of ciphertexts and indexes,the proposed scheme’s overhead is(2I+4)|G1|,whereas the overhead for both the other schemes surpasses that of the scheme detailed in this document.A theoretical analysis and simulation experiments were conducted on the other functional modules of the proposed scheme for their storage overhead,and the results indicate that the overhead is also within a reasonable range.
7 Summary
The current work introduces a lightweight,searchable,and controllable EMR sharing scheme.The proposed framework integrates keyword search with policy hiding,employing large attribute domains and a linear key-sharing structure to enhance the scalability and flexibility of access control.Within this scheme,Intel SGX technology is utilized to re-encrypt data,effectively thwarting offline dictionary guessing attacks and reducing decryption computational overhead to a constant level,catering to users with limited computing resources.To precisely manage data access,the scheme implements dynamic accumulator technology,enabling data owners to grant or revoke access permissions to data requesters flexibly.Additionally,the generation of data requester access logs and the uploading of corresponding hash values to the blockchain efficiently prevent denial and tampering of data.Furthermore,the inclusion of regulatory bodies to evaluate and hold accountable data access requests further elevates the system’s trustworthiness and security.
Through simulation experiments,the feasibility and superiority of the proposed strategy have been confirmed.Relative to existing solutions,the presented scheme exhibits significant advantages.However,the implementation of the current study has been confined to theoretical simulation due to resource constraints.Consequently,future research endeavors should focus on deploying the proposed strategy within real-world healthcare settings to further validate its effectiveness and practicality.
Acknowledgement:This study was supported by the Natural Science Foundation of Hebei Province,China,under Project F2021201052.I would like to express my heartfelt gratitude to Professor Xiaohui Yang for his valuable guidance and support throughout this research.I also want to thank all the classmates who provided valuable suggestions for the experiments.Lastly,I am grateful to this esteemed journal for providing an opportunity for further learning.
Funding Statement:Yang’s work was supported by the Natural Science Foundation of Hebei Province under Grant Number F2021201052.
Author Contributions:The authors confirm contribution to the paper as follows: Study conception and design:Xiaohui Yang,Peiyin Zhao;data collection:Peiyin Zhao;analysis and interpretation of results:Xiaohui Yang,Peiyin Zhao;draft manuscript preparation:Peiyin Zhao.All authors reviewed the results and approved the final version of the manuscript.
Availability of Data and Materials:The data that support the findings of this study are available from the corresponding author upon reasonable request.
Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.
杂志排行
Computers Materials&Continua的其它文章
- A Hybrid Level Set Optimization Design Method of Functionally Graded Cellular Structures Considering Connectivity
- A Spectral Convolutional Neural Network Model Based on Adaptive Fick’s Law for Hyperspectral Image Classification
- An Elite-Class Teaching-Learning-Based Optimization for Reentrant Hybrid Flow Shop Scheduling with Bottleneck Stage
- Internet of Things Authentication Protocols:Comparative Study
- Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication:Issues and Challenges
- Time and Space Efficient Multi-Model Convolution Vision Transformer for Tomato Disease Detection from Leaf Images with Varied Backgrounds