中国邮电高校学报(英文) ›› 2023, Vol. 30 ›› Issue (1): 66-79.doi: 10.19682/j.cnki.1005-8885.2023.2007

• Wireless • 上一篇    下一篇

Enhanced secure medical data sharing with traceable and direct revocation

Peng Weiping, Cui Shuang, Song Cheng, Han Ning   

  1. School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China
  • 收稿日期:2021-06-28 修回日期:2022-03-20 接受日期:2023-02-13 出版日期:2023-02-28 发布日期:2023-02-28
  • 通讯作者: Peng Weiping, E-mail: pwp9999@hpu.edu.cn E-mail:pwp9999@hpu.edu.cn
  • 基金资助:
    This work was supported by the National Key Research and Development Program of China (2018YFC0604502) and the Funding Project for the Young Backbone Teachers of Higher Education Institutions in Henan Province (2019GGJS061).

Enhanced secure medical data sharing with traceable and direct revocation

Peng Weiping, Cui Shuang, Song Cheng, Han Ning   

  1. School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China
  • Received:2021-06-28 Revised:2022-03-20 Accepted:2023-02-13 Online:2023-02-28 Published:2023-02-28
  • Contact: Peng Weiping, E-mail: pwp9999@hpu.edu.cn E-mail:pwp9999@hpu.edu.cn
  • Supported by:
    This work was supported by the National Key Research and Development Program of China (2018YFC0604502) and the Funding Project for the Young Backbone Teachers of Higher Education Institutions in Henan Province (2019GGJS061).

摘要: Sharing of the electronic medical records among different hospitals raises serious concern of the leakage of individual privacy for the adoption of the semi trustworthiness of the medical cloud platform. The tracking and revocation of malicious users have become urgent problems. To solve these problems, this paper proposed a traceable and directly revocable medical data sharing scheme. In the scheme, a unique identity parameter (ID), which was generated and embedded in the private key generation phase by the medical service provider (MSP), is used to identify legal authorized user and trace malicious user. Only when attributes satisfy the access policy and user's ID is not in the revocation list can the user calculate the decryption key. Malicious user can be tracked and directly revoked by using the revocation list. Under the assumption of decision bilinear Diffie-Hellman (DBDH), this paper has proved that the scheme is able to achieve security against chosen-plaintext attack (CPA). The performance analysis demonstrates that the sizes of the public key and private key are shorter, and the time overhead is less than other schemes in the public-private key generation, data encryption and data decryption stages.

关键词: medical data sharing, electronic medical records, tracking and revocation, privacy protection

Abstract: Sharing of the electronic medical records among different hospitals raises serious concern of the leakage of individual privacy for the adoption of the semi trustworthiness of the medical cloud platform. The tracking and revocation of malicious users have become urgent problems. To solve these problems, this paper proposed a traceable and directly revocable medical data sharing scheme. In the scheme, a unique identity parameter (ID), which was generated and embedded in the private key generation phase by the medical service provider (MSP), is used to identify legal authorized user and trace malicious user. Only when attributes satisfy the access policy and user's ID is not in the revocation list can the user calculate the decryption key. Malicious user can be tracked and directly revoked by using the revocation list. Under the assumption of decision bilinear Diffie-Hellman (DBDH), this paper has proved that the scheme is able to achieve security against chosen-plaintext attack (CPA). The performance analysis demonstrates that the sizes of the public key and private key are shorter, and the time overhead is less than other schemes in the public-private key generation, data encryption and data decryption stages.

Key words: medical data sharing, electronic medical records, tracking and revocation, privacy protection

中图分类号: