Abstract
In the cloud applications of medical data based on blockchain, doctors and managers usually want to obtain image data shared by other healthcare institutions. To ensure the privacy and workability of the image data, it is necessary to encrypt plain image data, retrieve cypher data and verify the authenticity of the data. Public key authenticated searchable encryption (PAEKS) is an effective mechanism to realize the privacy and workability properties of data. However, the existing PAEKS schemes are unable to realize the identity privacy protection of the data owner, and the traditional blockchain system (such as the Bitcoin) cannot achieve these goals directly. To overcome the above drawback, we first present a deniably authenticated searchable encryption scheme for medical image data sharing (DASES) that is based on blockchain and deniably authenticated encryption technology. The DASES takes advantage of blockchain technology to ensure the non-tampered, unforgettable and traceability of the image data, and it also avoids the limitation of the blockchain’s own storage and computing power. The DASES can not only withstand inside keyword guessing attack (IKGA) but also provide effective privacy protection and verify the authenticity of medical image data. Hence, it can better protect the privacy of data senders and provide stronger security. Next, we prove that the DASES satisfies the indistinguishability of the ciphertext and trapdoor. It is regrettable that the DASES is less efficient than related schemes in the literature, but its greatest strength is its ability to provide better identity privacy protection and stronger security.
Similar content being viewed by others
References
Boneh D, Crescenzo G D, Ostrovsky R, Persiano G (2004). Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, 506–522
Byun J W, Rhee H S, Park H A (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on Secure Data Management, 75–83
Dimitrov DV (2016) Medical internet of things and big data in healthcare. Healthc Inform Res 22(3):156–163
Emmanuel A, Jin CH, Li FG (2018) Certificateless deniably authenticated encryption and its application to e-voting system. Telecommun Syst 70(3):417–434
Emura K, Miyaji A, Rahman MS, Omote K (2015) Generic constructions of secure-channel free searchable encryption with adaptive security. Secur Commun Netw 8(8):1547–1560
He D, Ma M, Zeadally S, Kumar N, Liang K (2018) Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE T Ind Infrom 14(8):3618–3627
Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403-404(8):1–14
Huang DM, Geng X, Wei LF, Cheng S (2016) A secure query scheme on encrypted remote sensing images based on Henon mapping. Journal of Software 41(2):1729–1740
Huang DM, Wu GJ, Wei LF, Wei QM (2019) A secure outsourcing search scheme for encrypted remote sensing images. Laser & Optoelectronics Progress 56(3):031001
Li F, Zhong D, Takagi T (2016) Efficient deniably authenticated encryption and its application to E-mail. IEEE T Inf Foren Sec 11(11):2477–2486
Li H, Zhang F, He J et al (2017). A searchable symmetric encryption scheme using BlockChain. arXiv preprint
Li H, Huang Q, Shen J, Yang G, Susilo W (2019) Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf Sci 481(5):330–343
Lu Y, Li JG, Shen J, Zhang YC (2019) Secure Channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks. IEEE T Serv Comput 99:1–1
Ma W Y, Zhang H J (1998). Benchmarking of image features for content-based retrieval. In: The 32 Asilomar conference on signals, systems & computers, 253-257
Ma M, He D, Khan MK (2017) Certificateless searchable public key encryption scheme for mobile healthcare system. Comput Electr Eng 65(6):413–424
Miguel C, Barbara L (1999). Practical byzantine fault tolerance. In: The proceedings of the third symposium on operating systems design and implementation, 173-186
Nakamoto S (2008). Bitcoin: A peer-to-peer electronic cash system. www.bitcoin.org
Peng YG, Cui JT, Peng CG (2014) Certificateless public key encryption with keyword search. China Commun 11(11):100–113
Rhee HS, Park JH, Lee DH (2012) Generic construction of designated tester public-key encryption with keyword search. Inf Sci 205(1):93–109
Song X, Wagner D, Perrig (2000). Practical techniques for searches on encrypted data. In: Security and Privacy 2000 S&P 2000. Proceedings. 2000 IEEE Symposium on, 44–55
Sun Y, Zhang R, Wang X et al (2018). A decentralizing attribute-based signature for healthcare Blockchain. In: 2018 27th international conference on computer communication and networks (ICCCN), 1-9
The pairing-based cryptography library (2010) http://crypto.stanford.edu/pbc/
Wu W, Li F (2016) An efficient identity-based deniable authenticated encryption scheme. KSII T Internet Inf 9(5):1904–1919
Wu T Y, Meng F, Chen C M, Liu S (2016). On the security of a certificateless searchable public key encryption scheme. In international conference on genetic and evolutionary computing, 113-119
Wu LB, Zhang YB, Ma M (2019) Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted. Ann Telecommun 74:423–434
Zhang J, Xue N, Huang XA (2016) Secure system for pervasive social network-based healthcare. IEEE Access 4(99):9239–9250
Zhang YL, Wen L, Zhang YJ et al (2019) Designated server Certificateless deniably authenticated encryption with keyword search. IEEE Access 7:146542–146551
Zhu XD, Li H, Guo Z (2014) Privacy-preserving query over the encrypted image in cloud computing. Journal of xidian university 41(2):151–158
Acknowledgements
This work is supported in part by the National Natural Science Foundation of China under Grant No.61662069, Higher Educational Scientific Research Foundation of Gansu Province under Grant No.2017A-003, and 2018A-207.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhang, Yl., Wen, L., Zhang, Yj. et al. Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing. Multimed Tools Appl 79, 27075–27090 (2020). https://doi.org/10.1007/s11042-020-09213-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09213-w