| Literature DB >> 26404300 |
Shunrong Jiang1, Xiaoyan Zhu2, Liangmin Wang3.
Abstract
Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.Entities:
Keywords: attribute-based encryption; bloom filter; mobile healthcare social networks; privacy
Mesh:
Year: 2015 PMID: 26404300 PMCID: PMC4610573 DOI: 10.3390/s150922419
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Comparison of related works.
| Multi-Authority | Broadcast | Cloud Computing | Mobile Device | |
|---|---|---|---|---|
| [ | ||||
| [ | ||||
| [ | ||||
| [ | ||||
| [ | ||||
| [ | ||||
| [ |
The computational overhead for repeating decryption.
| Computation Overhead | |
|---|---|
| [ | |
| [ | |
| [ | |
| [ |
Figure 1The system model for mobile healthcare social networks (MHSNs).
Figure 2An attribute set satisfying a linear secret-sharing scheme (LSSS).
Figure 3The attribute names and values of personal health information (PHI).
Figure 4An access policy consisting of attribute values can be expressed by an access policy consisting of attribute names and a Bloom filter consisting of attribute values.
The comparison of the computational overhead. ABE, attribute-based encryption.
| ( | ABE Ciphertext | Cloud Decryption | Final Decryption | ||
|---|---|---|---|---|---|
| Size | |||||
| Computation | 0 |
Figure 5The performance of our ABE with outsourced decryption. (a) ABE ciphertext size; (b) partially-decrypted ciphertext size; (c) decryption time; (d) transformation keygen; (e) partial decryption time for the cloud; (f) final decryption time.
The comparison of the computational overhead.
| Scheme in [ | Our Scheme | |
|---|---|---|
| Generation phase | ( | |
| Match phase |
Figure 6The performanceof match schemes. (a) the generation time for matching; (b) the match time.