期刊文献+

策略隐藏的属性加密方案在智慧医疗系统的应用

Application of Attribute Encryption Scheme of Policy Hiding in Intelligent Medical System
下载PDF
导出
摘要 目前智慧医疗的广泛应用给予我们就医方便的同时,存在患者对个人医疗数据不可控、隐私泄露、共享效率低下等问题。针对这些问题,本方案提出了一种基于策略隐藏的属性加密方案在智慧医疗系统中的应用。首先,本方案使用属性加密技术加密电子医疗记录不仅可以保护用户隐私,也实现了细微粒的访问控制;其次,通过隐藏访问结构,更加安全地保护用户的敏感信息不会被轻易泄露;此外,用户在解密时使用外包解密的形式把隐藏的访问结构和加密的密文文档发送于医疗云服务器,从而减小用户的解密开销;本方案还支持密文检索,在解密之前,这个技术被用来实行解密测试,极大地提高了解密有效性。最后,效率分析表明,本方案在保护患者隐私安全的情况下,满足云存储环境下密钥管理的安全、高效的要求。 At present,while the wide application of smart medical treatment makes it convenient for us to see a doctor,there are problems such as uncontrollable personal medical data of patients,privacy disclosure,and low sharing efficiency.To solve these problems,this scheme proposes an attribute encryption scheme based on policy hiding in the smart medical system.Firstly,this scheme uses attribute encryption technology to encrypt electronic medical records not only to protect user privacy,but also to realize the access control of fine particles.Secondly,by hiding the access structure,it is more secure to protect the sensitive information of users from being easily leaked;In addition,the user sends the hidden access structure and encrypted ciphertext documents to the medical cloud server in the form of outsourced decryption,thus reducing the decryption cost of the user;The scheme also supports ciphertext retrieval,which is used to perform decryption tests before decryption,greatly improving the decryption effectiveness.Finally,efficiency analysis shows that this scheme meets the requirements of secure and efficient key management in cloud storage environment while protecting the privacy and security of patients.
作者 杨晓涛 常在斌 YANG Xiaotao;CHANG Zaibin(Xi'an Traffic Engineering Institute,Xi'an Shaanxi 710300,China)
出处 《西安交通工程学院学术研究》 2023年第2期22-28,共7页 Academic Research of Xi'an Traffic Engineering Institute
关键词 属性加密 策略隐藏 外包解密 电子医疗记录 Attribute encryption police hiding outsourcing decryption electronic medical records
  • 相关文献

参考文献5

二级参考文献54

  • 1YOUNES M. Role of respiratory control mechanisms in the pathogenesis of obstructive sleep disorders [J]. J Appl Physiol, 2008, 105: 1389-1405.
  • 2PATEL S, MANCINELLI C, BONATO P, et al. Using wearable sensors to monitor pbysical activities of patients with COPD: a comparison of classifier performance [C]// Proceedings of 2009 Sixtb International Workshop on Wearable and lmplantable Body Sensor Networks. Berkeley, CA: BSN, 2009: 234-239.
  • 3LI Huan-bang, YAZDANDOOST Kamya Yekeh, ZHEN Bin. Wireless body area network [M]. [S.I.]: River Publishers, 2010.
  • 4Sahai A, Waters B. Fuzzy Identity-based Encryp- tion[C]//Proceedings of Cryptology-EUROCRYPT' 05. Berlin, Germany : Springer, 2005 : 457-473.
  • 5Bethencourt J, Sahai A, Waters B. Ciphertext-policy Attribute-based Encryption [ C ]//Proceedings of IEEE Symposium on Security and Privacy. Washington D. C. , USA :IEEE Press ,2007:321-334.
  • 6Waters B. Ciphertext-policy Attribute-based Encryption: An Expressive, Efficient, and Provably Secure Realiza- tion[ C]// Proceedings of PKC ' 11. Berlin, Germany: Springer,2011:53-70.
  • 7Goyal V, Pandey O, Sahai A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[ C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, USA : ACM Press ,2006:89-98.
  • 8Attrapadung N, Imai H. Attribute-based Encryption Supporting Direct/indirect Revocation Modes [ M]// Parker M G. Cryptography and Coding. Berlin, Germany: Springer ,2009 : 278-300.
  • 9HanaokaY, Hanaoka G, Shikata J, et al. Identity-based Hierarchical Strongly Key-insulated Encryptiorl and Its Appl- ication [C ]//Proceedings of Cryptology-ASIACRYPT' 05.Berlin, Germany : Springer,2005 : 495 -514.
  • 10Boldyreva A, Goyal V, Kumar V. Identity-based Encryption with Efficient Revocation [ C ]//Proceedings of the 15th ACM Conference on Computer and Communications Security. New York, USA ACM Press, 2008:417-426.

共引文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部