Abstract
Personal Health Record (PHR) is an online electronic application used by patients to store, retrieve and share their health information in a private and secure environment. While outsourcing the PHR into cloud environment, there exist issues in privacy while storing, searching and sharing of health information. To overcome these issues, an efficient retrieval of health records using Multi Keyword Searchable Attribute Based Encryption (MK-SABE) is proposed. To manage the increasing PHR data in the cloud, an Authorized File Level Deduplication technique is adopted. It eliminates redundant files, thereby reducing the communication overhead. Moreover, PHR data is encrypted before outsourcing and to perform searching over encrypted data, the proposed MK-SABE introduces Conjunctive Multi Keyword Searchable Attribute Based Encryption (CM-SABE). This maintains the searchable property after encryption for efficient retrieval of health files using range query. Further to ensure the trustworthiness while sharing the sensitive data, MK-SABE introduces the Location Based Encryption (LBE) and Dynamic Location Based ReEncryption (DLBRE) technique to provide additional security. From the experimental analysis, it is proved that the proposed MK-SABE reduces the storage complexity by 5%, keyword search time by 25% and improves the overall performance of PHR by 40% compared to the existing schemes.
Similar content being viewed by others
References
Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order- preserving encryption for numeric data. In: SIGMOD 2004, pp. 563–574. ACM, New York
Besher KM, Subah Z, Ali MZ IoT Sensor Initiated Healthcare Data Security, in IEEE Sens J. https://doi.org/10.1109/JSEN.2020.3013634.
Boldyreva A, Chenette N, Lee Y, O’Neill A (2009) Order-preserving symmetric encryption, advances in cryptology - EUROCRYPT 2009. Lecture Notes in Com- puter Science, vol 5479
Borse Manoj V, Bhandure Harshad D, Patil Dhiraj M, Bhad Pratik B (2014) Location Based Encryption-Decryption Approach for Data Security, Int J Comput Appl Technol Res. Volume 3– Issue 10, 610–611
Cao N, Wang C, Li M, Ren K, Lou W (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud data, Proc IEEE INFOCOM, pp. 829–837
Cao N, Wang C, Li M, Ren K, Lou W (Jan. 2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distributed Syst 25(1):222–233
Ding J, Errapotu SM, Guo Y, Zhang H, Yuan D, Pan M Private Empirical Risk Minimization with Analytic Gaussian Mechanism for Healthcare System, in IEEE Trans Big Data. https://doi.org/10.1109/TBDATA.2020.2997732.
Dolendro Singh L, Manglem Singh K (2018) Visually meaningful multi-image encryption scheme. Arab J Sci Eng 43:7397–7407. https://doi.org/10.1007/s13369-018-3104-7
Golle P, Staddon J, Wa-ters B (2004) Secure Conjunctive Keyword Search over Encrypted Data
Guo, Cheng, et al. (2016) Fine-Grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds. J Med Syst, vol. 40, no. 11
Guo C, Zhuang R, Jie Y, Choo KR, Tang X (2019a) Secure range search over encrypted uncertain IoT outsourced data. IEEE Internet Things J 6(2):1520–1529
Guo C, Su S, Choo KR, Tang X (2019b) A Fast Nearest Neighbor Search Scheme over Outsourced Encrypted Medical Images, in IEEE Trans Ind Inf
Guo C, Chen X, Jie Y, Zhangjie F, Li M, Feng B (2019c) Dynamic Multi-phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption, in IEEE Trans Service Comput.
Handa R, Rama Krishna C, Aggarwal N (2019) Keyword binning-based efficient search on encrypted cloud data. Arab J Sci Eng 44:3559–3584
Karimi R, Kalantari M (2011) Enhancing security and confidentiality in location based data encryption algorithms, IEEE, pp 30–35. https://doi.org/10.1109/ICADIWT.2011.6041421
Kaushik K, Varadharajan V, Nallusamy R (2013) Multi-user Attribute Based Searchable Encryption, 2013 IEEE 14th international conference on Mobile data man- agement, Milan, 200–205
Krall A, Finke D, Yang H Mosaic Privacy-preserving Mechanisms for Healthcare Analytics, in IEEE J Biomed Health Inf. https://doi.org/10.1109/JBHI.2020.3036422.
Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health Records in Cloud Computing using attribute-based encryption. IEEE trans parallel distributed syst Vol:24 no:1 year
Li J, Chen XF, Xhafa F, Barolli L (2015a) Secure deduplication storage systems supporting keyword search. J Comput Syst Sci 81:1532–1541
Jin Li, Yan Kit Li, Xiao Feng Chen, Patrick P.C. Lee, and Wenjing Lou (2015b) A Hybrid Cloud Approach for Secure Authorized Deduplication, IEEE Trans Parallel Distribute Syst, Vol. 26, No. 5
Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992
Liang K, Fang L, Susilo W, Wong DS (2013) A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security
Liang K, Au MH, Liu JK, Susilo W, Wong DS, Yang G, Phuong TVX, Xie Q (2014) A DFA-based functional proxy re- encryption scheme for secure public cloud data sharing. IEEE Trans Inf Forensics Secur 9(10):1667–1680
Milojičić D, Llorente IM, Montero RS (2011) OpenNebula: A Cloud Management Tool. IEEE Internet Comput 15(2):11–14
Sahai A, Goyal V, Pandey O, Wa-ters B (2005) Attribute-based encryption for fine-grained access control of encrypted data. IEEE transactions on parallel and distributed systems year
Vidya S, Vani K, Kavin Priya D (2012) “Secured per- sonal health records transactions using Homomorphic encryption in cloud computing. Int J Eng Res Technol volume 1– issue 10
Wang B, Fan X (2016) Search ranges efficiently and compatibly as keywords over encrypted data, IEEE Trans Dependable Secure Comput
Wang Q, Zhu Y*, Luo X, Multi-user Searchable Encryption with Fine-Grained Access Control without Key Sharing, 2014 3rd International Conference on Advanced Computer Science Applications and Technolo- gies.
Wang B, Song W, Lou W, Hou YT (2015) Inverted index based multi-keyword public-key searchable encryp- tion with strong privacy guarantee, 2015 IEEE Confer- ence on Computer Communications (INFOCOM), Kowloon, 2092–2100
Wang S, Jia S, Zhang Y (2019) Verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage. IEEE Access 7:50136–50147
Xia Z, Wang X, Sun X, Wang Q (2016) A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans Parallel Distributed Syst 27(2):340–352
Ya-ling Z, Kai L, Shang-ping W, Qin-dong S, A Multi-users Searchable Encryption Scheme with Proxy Re-encryption, 2014 10th International Conference on Computational Intelligence and Security.
Zhang C, Zhang Y, Zhang W, X. Lin (2016) Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search, IEEE Trans Knowledge Data Eng, vol. 28, no.7, pp.1706-1721
Zheng Q, Xu S, Ateniese G (2014) VABKS:Verifiable attribute-based keyword search over outsourced encrypted data, in Proc. IEEE Conf. Comput. Commun. (INFOCOM), Toronto, ON, Canada, pp.522–530.
Zhou T, Shen J, He D, Vijayakumar P, Kumar N Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare, IEEE Trans Emerg Topics Comput Intell. https://doi.org/10.1109/TETCI.2020.2993841.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors have no conflicts of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sangeetha, D., Chakkaravarthy, S.S., Satapathy, S.C. et al. Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud. Multimed Tools Appl 81, 22065–22085 (2022). https://doi.org/10.1007/s11042-021-10817-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10817-z