Abstract
In order to protect the privacy of the data, the data owners encrypt their sensitive data before transferring it to cloud servers. This method leads to the inability to search over these data. To tackle these challenges, we propose a Secure Mobile Health System (SMHS) supporting search function and decryption verification by using online/offline attribute-based encryption. The new scheme provides a secure Electronic Health Records (EHRs) and efficient searching over the health cloud. In the security analysis, the proposed scheme is proved in the standard model. In addition, we explain via experimental results with a comparison to similar existing protocols that the SMHS can significantly reduce the computation cost in the mobile health system.
Similar content being viewed by others
References
Alshehri S, Radziszowski SP, Raj RK (2012) Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption. In: IEEE 28th International Conference on Data Engineering Workshops. IEEE, pp 143–146
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy (SP’07). IEEE, pp 321–334
Bhatia T, Verma AK, Sharma G (2018) Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud. Trans Emerg Telecommun Technol 29(6):e3309
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 506–522
Cai Z, Yan H, Li P, Za Huang, Gao C (2017) Towards secure and flexible ehr sharing in mobile health cloud under static assumptions. Cluster Comput 20(3):2415–2422
Caro AD (2013) The java pairing based cryptography library (jpbc), pp 02–24. http://gas.dia.unisa.it/projects/jpbc/
Elhabob R, Zhao Y, Sella I, Xiong H (2020) An efficient certificateless public key cryptography with authorized equality test in IIoT. J Ambient Intell Human Comput 11(3):1065–1083
Fernández-Alemán JL, Señor IC, Lozoya PÁO, Toval A (2013) Security and privacy in electronic health records: a systematic literature review. J Biomed Inform 46(3):541–562
Goroll AH, Simon SR, Tripathi M, Ascenzo C, Bates DW (2009) Community-wide implementation of health information technology: the massachusetts ehealth collaborative experience. J Am Med Inform Assoc 16(1):132–139
Guo F, Mu Y, Chen Z (2008) Identity-based online/offline encryption. In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, pp 247–261
Hasselbring W, Pedersen S (2005) Metamodelling of domain-specific standards for semantic interoperability. In: Biennial Conference on Professional Knowledge Management/Wissensmanagement, Springer, pp 557–559
Hohenberger S, Waters B (2013) Attribute-based encryption with fast decryption. In: International workshop on public key cryptography. Springer, Heidelberg, pp 162–179
Hohenberger S, Waters B (2014) Online/offline attribute-based encryption. In: International workshop on public key cryptography. Springer, Berlin, Heidelberg, pp 293–310
Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221
Index (2020) Hermetic word frequency counter. http://www.hermetic.ch/wfc/wfc.htm
Krist AH, Peele E, Woolf SH, Rothemich SF, Loomis JF, Longo DR, Kuzel AJ (2011) Designing a patient-centered personal health record to promote preventive care. BMC Med Inform Decision Making 11(1):73
Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143
Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo KKR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443
Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inform Foren Secur 10(9):1981–1992
Liu Y, Zhang Y, Ling J, Liu Z (2018) Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Fut Gen Computer Syst 78:1020–1026
Lynn B (2013) The stanford pairing based crypto library. Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid 324
Malluhi QM, Shikfa A, Trinh VC (2017) A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security, pp 230–240
Miao Y, Ma J, Liu X, Weng J, Li H, Li H (2018) Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans Serv Comput 12(5):772–785
Narayan S, Gagné M, Safavi-Naini R (2010) Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pp 47–52
Park JH, Seol JA, Oh YH (2005) Design and implementation of an effective mobile healthcare system using mobile and RFID technology. In: Proceedings of 7th international workshop on enterprise networking and computing in healthcare industry. HEALTHCOM 2005. IEEE, pp 263–266
Qin B, Deng H, Wu Q, Domingo-Ferrer J, Naccache D, Zhou Y (2015) Flexible attribute-based encryption applicable to secure e-healthcare records. Int J Inform Secur 14(6):499–511
Ramu G, Reddy BE (2015) Secure architecture to manage EHR in cloud using sse and abe. Health Technol 5(3–4):195–205
RFC (2020) Request for comments database
Roy S, Das AK, Chatterjee S, Kumar N, Chattopadhyay S, Rodrigues JJ (2019) Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans Ind Inform 15(1):457–468
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 457–473
Satyanarayanan M (2010) Mobile computing: the next decade. In: Proceedings of the 1st ACM workshop on mobile cloud computing and services: social networks and beyond (MCS)
Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198
Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International workshop on public key cryptography. Springer, Berlin, Heidelberg, pp 53–70
Yang J, Wang H, Wang J, Tan C, Yu D (2011) Provable data possession of resource-constrained mobile devices in cloud computing. J Netw 6(7):1033
Yang Y, Liu X, Deng RH, Li Y (2017) Lightweight sharable and traceable secure mobile health system. IEEE Trans Dependable Secure Comput 17(1):78–91
Yang Y, Liu X, Deng RH (2018) Lightweight break-glass access control system for healthcare internet-of-things. IEEE Trans Ind Inform 14(8):3610–3617
Yan H, Li X, Li J (2014) Secure personal health record system with attribute-based encryption in cloud computing. In: 2014 Ninth international conference on P2P, parallel, grid, cloud and internet computing. IEEE, pp 329–332
Zhang Y, Zheng D, Chen X, Li J, Li H (2016) Efficient attribute-based data sharing in mobile clouds. Pervasive Mob Comput 28:135–149
Acknowledgements
This work is supported by the National Natural Science Foundation of China (Grant No. 61872058) and Fundamental Research Funds for the Central Universities (Grant No. ZYGX2016J081).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors state that they have no conflict of interest.
Ethical standard
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was taken from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Eltayieb, N., Elhabob, R., Hassan, A. et al. Secure mobile health system supporting search function and decryption verification. J Ambient Intell Human Comput 12, 2221–2231 (2021). https://doi.org/10.1007/s12652-020-02321-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02321-3