Skip to main content
Log in

Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud

  • 1200: Machine Vision Theory and Applications for Cyber Physical Systems
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Personal Health Record (PHR) is an online electronic application used by patients to store, retrieve and share their health information in a private and secure environment. While outsourcing the PHR into cloud environment, there exist issues in privacy while storing, searching and sharing of health information. To overcome these issues, an efficient retrieval of health records using Multi Keyword Searchable Attribute Based Encryption (MK-SABE) is proposed. To manage the increasing PHR data in the cloud, an Authorized File Level Deduplication technique is adopted. It eliminates redundant files, thereby reducing the communication overhead. Moreover, PHR data is encrypted before outsourcing and to perform searching over encrypted data, the proposed MK-SABE introduces Conjunctive Multi Keyword Searchable Attribute Based Encryption (CM-SABE). This maintains the searchable property after encryption for efficient retrieval of health files using range query. Further to ensure the trustworthiness while sharing the sensitive data, MK-SABE introduces the Location Based Encryption (LBE) and Dynamic Location Based ReEncryption (DLBRE) technique to provide additional security. From the experimental analysis, it is proved that the proposed MK-SABE reduces the storage complexity by 5%, keyword search time by 25% and improves the overall performance of PHR by 40% compared to the existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order- preserving encryption for numeric data. In: SIGMOD 2004, pp. 563–574. ACM, New York

  2. Besher KM, Subah Z, Ali MZ IoT Sensor Initiated Healthcare Data Security, in IEEE Sens J. https://doi.org/10.1109/JSEN.2020.3013634.

  3. Boldyreva A, Chenette N, Lee Y, O’Neill A (2009) Order-preserving symmetric encryption, advances in cryptology - EUROCRYPT 2009. Lecture Notes in Com- puter Science, vol 5479

  4. Borse Manoj V, Bhandure Harshad D, Patil Dhiraj M, Bhad Pratik B (2014) Location Based Encryption-Decryption Approach for Data Security, Int J Comput Appl Technol Res. Volume 3– Issue 10, 610–611

  5. Cao N, Wang C, Li M, Ren K, Lou W (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud data, Proc IEEE INFOCOM, pp. 829–837

  6. Cao N, Wang C, Li M, Ren K, Lou W (Jan. 2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distributed Syst 25(1):222–233

    Article  Google Scholar 

  7. Ding J, Errapotu SM, Guo Y, Zhang H, Yuan D, Pan M Private Empirical Risk Minimization with Analytic Gaussian Mechanism for Healthcare System, in IEEE Trans Big Data. https://doi.org/10.1109/TBDATA.2020.2997732.

  8. Dolendro Singh L, Manglem Singh K (2018) Visually meaningful multi-image encryption scheme. Arab J Sci Eng 43:7397–7407. https://doi.org/10.1007/s13369-018-3104-7

    Article  Google Scholar 

  9. Golle P, Staddon J, Wa-ters B (2004) Secure Conjunctive Keyword Search over Encrypted Data

  10. Guo, Cheng, et al. (2016) Fine-Grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds. J Med Syst, vol. 40, no. 11

  11. Guo C, Zhuang R, Jie Y, Choo KR, Tang X (2019a) Secure range search over encrypted uncertain IoT outsourced data. IEEE Internet Things J 6(2):1520–1529

    Article  Google Scholar 

  12. Guo C, Su S, Choo KR, Tang X (2019b) A Fast Nearest Neighbor Search Scheme over Outsourced Encrypted Medical Images, in IEEE Trans Ind Inf

  13. Guo C, Chen X, Jie Y, Zhangjie F, Li M, Feng B (2019c) Dynamic Multi-phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption, in IEEE Trans Service Comput.

  14. Handa R, Rama Krishna C, Aggarwal N (2019) Keyword binning-based efficient search on encrypted cloud data. Arab J Sci Eng 44:3559–3584

    Article  Google Scholar 

  15. Karimi R, Kalantari M (2011) Enhancing security and confidentiality in location based data encryption algorithms, IEEE, pp 30–35. https://doi.org/10.1109/ICADIWT.2011.6041421

  16. Kaushik K, Varadharajan V, Nallusamy R (2013) Multi-user Attribute Based Searchable Encryption, 2013 IEEE 14th international conference on Mobile data man- agement, Milan, 200–205

  17. Krall A, Finke D, Yang H Mosaic Privacy-preserving Mechanisms for Healthcare Analytics, in IEEE J Biomed Health Inf. https://doi.org/10.1109/JBHI.2020.3036422.

  18. Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health Records in Cloud Computing using attribute-based encryption. IEEE trans parallel distributed syst Vol:24 no:1 year

  19. Li J, Chen XF, Xhafa F, Barolli L (2015a) Secure deduplication storage systems supporting keyword search. J Comput Syst Sci 81:1532–1541

    Article  MathSciNet  Google Scholar 

  20. Jin Li, Yan Kit Li, Xiao Feng Chen, Patrick P.C. Lee, and Wenjing Lou (2015b) A Hybrid Cloud Approach for Secure Authorized Deduplication, IEEE Trans Parallel Distribute Syst, Vol. 26, No. 5

  21. Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992

    Article  Google Scholar 

  22. Liang K, Fang L, Susilo W, Wong DS (2013) A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security

  23. Liang K, Au MH, Liu JK, Susilo W, Wong DS, Yang G, Phuong TVX, Xie Q (2014) A DFA-based functional proxy re- encryption scheme for secure public cloud data sharing. IEEE Trans Inf Forensics Secur 9(10):1667–1680

    Article  Google Scholar 

  24. Milojičić D, Llorente IM, Montero RS (2011) OpenNebula: A Cloud Management Tool. IEEE Internet Comput 15(2):11–14

    Article  Google Scholar 

  25. Sahai A, Goyal V, Pandey O, Wa-ters B (2005) Attribute-based encryption for fine-grained access control of encrypted data. IEEE transactions on parallel and distributed systems year

  26. Vidya S, Vani K, Kavin Priya D (2012) “Secured per- sonal health records transactions using Homomorphic encryption in cloud computing. Int J Eng Res Technol volume 1– issue 10

  27. Wang B, Fan X (2016) Search ranges efficiently and compatibly as keywords over encrypted data, IEEE Trans Dependable Secure Comput

  28. Wang Q, Zhu Y*, Luo X, Multi-user Searchable Encryption with Fine-Grained Access Control without Key Sharing, 2014 3rd International Conference on Advanced Computer Science Applications and Technolo- gies.

  29. Wang B, Song W, Lou W, Hou YT (2015) Inverted index based multi-keyword public-key searchable encryp- tion with strong privacy guarantee, 2015 IEEE Confer- ence on Computer Communications (INFOCOM), Kowloon, 2092–2100

  30. Wang S, Jia S, Zhang Y (2019) Verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage. IEEE Access 7:50136–50147

    Article  Google Scholar 

  31. Xia Z, Wang X, Sun X, Wang Q (2016) A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans Parallel Distributed Syst 27(2):340–352

    Article  Google Scholar 

  32. Ya-ling Z, Kai L, Shang-ping W, Qin-dong S, A Multi-users Searchable Encryption Scheme with Proxy Re-encryption, 2014 10th International Conference on Computational Intelligence and Security.

  33. Zhang C, Zhang Y, Zhang W, X. Lin (2016) Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search, IEEE Trans Knowledge Data Eng, vol. 28, no.7, pp.1706-1721

  34. Zheng Q, Xu S, Ateniese G (2014) VABKS:Verifiable attribute-based keyword search over outsourced encrypted data, in Proc. IEEE Conf. Comput. Commun. (INFOCOM), Toronto, ON, Canada, pp.522–530.

  35. Zhou T, Shen J, He D, Vijayakumar P, Kumar N Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare, IEEE Trans Emerg Topics Comput Intell. https://doi.org/10.1109/TETCI.2020.2993841.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suresh Chandra Satapathy.

Ethics declarations

Conflict of interest

All authors have no conflicts of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sangeetha, D., Chakkaravarthy, S.S., Satapathy, S.C. et al. Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud. Multimed Tools Appl 81, 22065–22085 (2022). https://doi.org/10.1007/s11042-021-10817-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10817-z

Keywords

Navigation