| Literature DB >> 30340411 |
Abstract
The sharing of electronic health records (EHR) in cloud servers is an increasingly important development that can improve the efficiency of medical systems. However, there are several concerns focusing on the issues of security and privacy in EHR system. The EHR data contains the EHR owner's sensitive personal information, if these data are obtained by a malicious user, it will not only cause the leakage of patient's privacy, but also affect the doctor's diagnosis. It is a very challenging problem for the EHR owner fully controls over own EHR data as well as preserves the privacy of himself. In this paper, we propose a new privacy-preserving access control (PPAC) scheme for EHR. To achieve fine-grained access control of the EHR data, we utilize the attribute-based signcryption (ABSC) mechanism to signcrypt data based on the access policy for the linear secret sharing schemes. Employing the cuckoo filter to hide the access policy, it could protect the EHR owner's privacy information. In addition, the security analysis shows that the proposed scheme is provably secure under the decisional bilinear Diffie-Hellman exponent assumption and the computational Diffie-Hellman exponent assumption in the standard model. Furthermore, the performance analysis indicates that the proposed scheme achieves low costs of communication and computation compared with the related schemes, meanwhile preserves the EHR owner's privacy. Therefore, the proposed scheme is better suited to EHR system.Entities:
Keywords: access control; attribute-based signcryption; cuckoo filter; electronic health records; privacy preserving
Mesh:
Year: 2018 PMID: 30340411 PMCID: PMC6210245 DOI: 10.3390/s18103520
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The LSSS access policy.
Figure 2Cuckoo hashing table. (a) the basic cuckoo hashing table; (b) inserting a new element.
Figure 3A framework of the EHR system.
Comparison of computation cost.
| Scheme | KP/CP | Access Structure | Public Verifiability | MC | CU | Security Model | Privacy-Preserving |
|---|---|---|---|---|---|---|---|
| [ | CP | Monotone tree | No | CPA | CMA | ROM | No |
| [ | CP | Monotone tree | Yes | CCA | CMA | SM | No |
| [ | KP | Threshold policy | No | CCA | CMA | SM | No |
| [ | CP | LSSS | Yes | CCA | CMA | SM | No |
| our | CP | LSSS | Yes | CCA | CMA | SM | Yes |
Time cost of cryptographic operation.
| Cryptographic Operation | Execution Time |
|---|---|
| Bilinear pairing | 9.0791 |
| Scalar multiplication in | 3.7770 |
| Scalar multiplication in | 0.9243 |
Comparison of computation cost.
| Scheme | Signcrypt | Unsigncrypt |
|---|---|---|
| [ | ||
| [ | ||
| [ | ||
| [ | ||
| The proposed scheme |
Figure 4Signcrypt cost with the number of attributes.
Figure 5Unsigncrypt cost with the number of attributes.
Comparison of communication costs.
| Scheme | |
|---|---|
| [ | |
| [ | |
| [ | |
| [ | |
| The proposed scheme |
Figure 6Unsigncrypt cost with the number of attributes.