Skip to main content
Log in

Secure mobile health system supporting search function and decryption verification

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In order to protect the privacy of the data, the data owners encrypt their sensitive data before transferring it to cloud servers. This method leads to the inability to search over these data. To tackle these challenges, we propose a Secure Mobile Health System (SMHS) supporting search function and decryption verification by using online/offline attribute-based encryption. The new scheme provides a secure Electronic Health Records (EHRs) and efficient searching over the health cloud. In the security analysis, the proposed scheme is proved in the standard model. In addition, we explain via experimental results with a comparison to similar existing protocols that the SMHS can significantly reduce the computation cost in the mobile health system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Alshehri S, Radziszowski SP, Raj RK (2012) Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption. In: IEEE 28th International Conference on Data Engineering Workshops. IEEE, pp 143–146

  • Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy (SP’07). IEEE, pp 321–334

  • Bhatia T, Verma AK, Sharma G (2018) Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud. Trans Emerg Telecommun Technol 29(6):e3309

    Article  Google Scholar 

  • Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 506–522

    Google Scholar 

  • Cai Z, Yan H, Li P, Za Huang, Gao C (2017) Towards secure and flexible ehr sharing in mobile health cloud under static assumptions. Cluster Comput 20(3):2415–2422

    Article  Google Scholar 

  • Caro AD (2013) The java pairing based cryptography library (jpbc), pp 02–24. http://gas.dia.unisa.it/projects/jpbc/

  • Elhabob R, Zhao Y, Sella I, Xiong H (2020) An efficient certificateless public key cryptography with authorized equality test in IIoT. J Ambient Intell Human Comput 11(3):1065–1083

    Article  Google Scholar 

  • Fernández-Alemán JL, Señor IC, Lozoya PÁO, Toval A (2013) Security and privacy in electronic health records: a systematic literature review. J Biomed Inform 46(3):541–562

    Article  Google Scholar 

  • Goroll AH, Simon SR, Tripathi M, Ascenzo C, Bates DW (2009) Community-wide implementation of health information technology: the massachusetts ehealth collaborative experience. J Am Med Inform Assoc 16(1):132–139

    Article  Google Scholar 

  • Guo F, Mu Y, Chen Z (2008) Identity-based online/offline encryption. In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, pp 247–261

    Chapter  Google Scholar 

  • Hasselbring W, Pedersen S (2005) Metamodelling of domain-specific standards for semantic interoperability. In: Biennial Conference on Professional Knowledge Management/Wissensmanagement, Springer, pp 557–559

  • Hohenberger S, Waters B (2013) Attribute-based encryption with fast decryption. In: International workshop on public key cryptography. Springer, Heidelberg, pp 162–179

    Google Scholar 

  • Hohenberger S, Waters B (2014) Online/offline attribute-based encryption. In: International workshop on public key cryptography. Springer, Berlin, Heidelberg, pp 293–310

    Google Scholar 

  • Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221

    Article  Google Scholar 

  • Index (2020) Hermetic word frequency counter. http://www.hermetic.ch/wfc/wfc.htm

  • Krist AH, Peele E, Woolf SH, Rothemich SF, Loomis JF, Longo DR, Kuzel AJ (2011) Designing a patient-centered personal health record to promote preventive care. BMC Med Inform Decision Making 11(1):73

    Article  Google Scholar 

  • Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143

    Article  Google Scholar 

  • Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo KKR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443

    Article  Google Scholar 

  • Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inform Foren Secur 10(9):1981–1992

    Article  Google Scholar 

  • Liu Y, Zhang Y, Ling J, Liu Z (2018) Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Fut Gen Computer Syst 78:1020–1026

    Article  Google Scholar 

  • Lynn B (2013) The stanford pairing based crypto library. Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid 324

  • Malluhi QM, Shikfa A, Trinh VC (2017) A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security, pp 230–240

  • Miao Y, Ma J, Liu X, Weng J, Li H, Li H (2018) Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans Serv Comput 12(5):772–785

    Article  Google Scholar 

  • Narayan S, Gagné M, Safavi-Naini R (2010) Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pp 47–52

  • Park JH, Seol JA, Oh YH (2005) Design and implementation of an effective mobile healthcare system using mobile and RFID technology. In: Proceedings of 7th international workshop on enterprise networking and computing in healthcare industry. HEALTHCOM 2005. IEEE, pp 263–266

  • Qin B, Deng H, Wu Q, Domingo-Ferrer J, Naccache D, Zhou Y (2015) Flexible attribute-based encryption applicable to secure e-healthcare records. Int J Inform Secur 14(6):499–511

    Article  Google Scholar 

  • Ramu G, Reddy BE (2015) Secure architecture to manage EHR in cloud using sse and abe. Health Technol 5(3–4):195–205

    Article  Google Scholar 

  • RFC (2020) Request for comments database

  • Roy S, Das AK, Chatterjee S, Kumar N, Chattopadhyay S, Rodrigues JJ (2019) Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans Ind Inform 15(1):457–468

    Article  Google Scholar 

  • Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 457–473

    Google Scholar 

  • Satyanarayanan M (2010) Mobile computing: the next decade. In: Proceedings of the 1st ACM workshop on mobile cloud computing and services: social networks and beyond (MCS)

  • Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198

    Article  Google Scholar 

  • Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International workshop on public key cryptography. Springer, Berlin, Heidelberg, pp 53–70

    Google Scholar 

  • Yang J, Wang H, Wang J, Tan C, Yu D (2011) Provable data possession of resource-constrained mobile devices in cloud computing. J Netw 6(7):1033

    Google Scholar 

  • Yang Y, Liu X, Deng RH, Li Y (2017) Lightweight sharable and traceable secure mobile health system. IEEE Trans Dependable Secure Comput 17(1):78–91

    Article  Google Scholar 

  • Yang Y, Liu X, Deng RH (2018) Lightweight break-glass access control system for healthcare internet-of-things. IEEE Trans Ind Inform 14(8):3610–3617

    Article  Google Scholar 

  • Yan H, Li X, Li J (2014) Secure personal health record system with attribute-based encryption in cloud computing. In: 2014 Ninth international conference on P2P, parallel, grid, cloud and internet computing. IEEE, pp 329–332

  • Zhang Y, Zheng D, Chen X, Li J, Li H (2016) Efficient attribute-based data sharing in mobile clouds. Pervasive Mob Comput 28:135–149

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Grant No. 61872058) and Fundamental Research Funds for the Central Universities (Grant No. ZYGX2016J081).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fagen Li.

Ethics declarations

Conflict of interest

The authors state that they have no conflict of interest.

Ethical standard

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was taken from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Eltayieb, N., Elhabob, R., Hassan, A. et al. Secure mobile health system supporting search function and decryption verification. J Ambient Intell Human Comput 12, 2221–2231 (2021). https://doi.org/10.1007/s12652-020-02321-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02321-3

Keywords

Navigation