期刊文献+

面向云端的电子病历数据管理研究 被引量:4

Research on Electronic Medical Record Data Management in Cloud Environment
下载PDF
导出
摘要 信息技术和大数据的发展推动了医疗记录的信息化。在这样的背景下,电子病历(EMR)系统作为其中的代表,改变了医疗数据的管理模式,但也带来了诸如身份认证和隐私保护等问题。针对这些问题,提出了一个基于身份的可认证密钥协商协议,通过密钥协商服务器执行此核心协议得到的会话密钥将用来对数据进行加密处理,并由安全高效的签名算法保证数据的真实性,最终实现医疗数据的安全管理。在e-CK模型下,利用可证明安全理论证明了该方案具有完美的前向安全性,能够抵御未知密钥共享攻击和密钥泄露模仿攻击等。此外,通过隐式的认证算法,EMR方案中的核心密钥协商协议能够支持共享密钥的属性认证。 The development of information technology and big data has promoted the informatization of medical records.As one of the representatives, the Electronic Medical Record(EMR)system has changed the mode of traditional medical data management, but there remains some problems such as identity authentication and privacy protection. To solve these problems, this paper proposes an identity based authenticated key agreement protocol. The key agreement server follows this protocol and fetches a session key, which will be used to encrypt the data. Secure and efficient signature algorithm is also used to guarantee the authenticity of data. Finally, the secure data management can be achieved. It is proved that this scheme has perfect forward security and is able to resist the unknown key sharing attack and key-compromise impersonation under the e-CK model. In addition, the core key agreement protocol in this scheme is designed to support sharing key confirmation property with an implicit authentication algorithm.
作者 李磊 许春根 徐磊 赵泽茂 LI Lei;XU Chungen;XU Lei;ZHAO Zemao(School of Science,Nanjing University of Science and Technology,Nanjing 210094,China;Institute of Technology,Lishui University,Lishui,Zhejiang 323000,China)
出处 《计算机工程与应用》 CSCD 北大核心 2019年第15期135-140,146,共7页 Computer Engineering and Applications
基金 江苏省自然科学基金(No.BK20141405) 浙江省自然科学基金(No.Y15F020053)
关键词 电子病历 密钥协商 密文检索 e-CK模型 electronic medical record key agreement encrypted search e-CK model
  • 相关文献

参考文献3

二级参考文献38

  • 1Boneh D,Di Crescenzo G,Ostrovsky R,et al.Public key en- cryption with keyword search[C]//LNCS 3027.Switzerland: Springer-Verlag, 2004: 506-522.
  • 2Boneh D, Franklin M.Identity-based eneryption from the weil pairing[C]//LNCS 2139.California: Springer-Verlag, 2001: 213-229.
  • 3A1-Riyami S,Paterson K.Certificateless public key cryptogra- phy[C]//LNCS 2332.Taiwan & Springer-Verlag, 2003 : 452-473.
  • 4Goyal V.Reducing trust in the PKG in identity-based crypto- systems[C]//LNCS 4622.California: Springer-Verlag, 2007: 430-447.
  • 5Shamir A.Identity-based cryptosystems and signature schemes[C]// LNCS 196.California: Springer-Verlag, 1985 : 48-53.
  • 6Fujisaki E, Okamoto T.Secure integration of asymmetric and symmetric encryption sehemes[C]//LNCS 1666.California: Springer-Verlag, 1999: 537-554.
  • 7Baek J, Safavi-Naini R, Susilo W.Public key encryption with keyword search revisited[C]//LNCS 5072: ICCSA 2008 Part 1.1taly: Springer-Verlag, 2008 : 1249-1259.
  • 8Rhee H S, Park J H, Susilo W, et al.Improved searchable public key encryption with designated tester[J].Journal of Systems and Software, 2010,83 (5) : 763-771.
  • 9Fujisaki E,Okamoto T.How to enhance the security of pub- lic key encryption at minimum cost[C]//LNCS 1560.Berlin: Springer, 1999 : 53-68.
  • 10Shao J, Cao Z, Liang X, et al.Proxy re-encryption with keyword search[J].Information Sciences, 2010,180 ( 13 ) : 2576-2587.

共引文献20

同被引文献37

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部