Abstract
In the Medical Information Systems (MIS), the patient outsources his e-health records, a dramatically huge amount of health data, to a third party like cloud service provider. The Internet providing host-to-host communication using TCP/IP network topology has not satisfied the growing demands of data processing in MIS. Based on the content-to-consumer paradigm, content-centric networking architecture was proposed for simple easy-to-manage caching features to users. In this paper, we proposed a privacy-preserving e-health records scheme that protects name and content simultaneously. Our proposal has multi-authority without a trusted single or central authority to distribute secret keys, which avoids the key escrow problem and meets the distributed features of MIS. As we know, this scheme is the first multi-authority content-based encryption (MA-CBE). Furthermore, this MA-CBE resists up to (N-1) corrupted authorities collusion attack, and the security is proven to be semantically secure based on the standard decisional bilinear Diffie-Hellman assumption. Our comparison analysis reports that the proposal gives a better performance than other related schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Microsoft HealthVault. http://www.healthvault.com
Google Health. http://www.healthgoogle.com
Cisco: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Updata, 2014–2019. Cisco White Paper (2015)
Jacobson, V., Smetters, D.K., Thomton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networing named content. In: 5th International Conference on Emerging and Technologies, pp. 1–12. ACM, New York (2009)
Tang, J.H., Quek, T.Q.S.: The role of cloud computing in content-centric mobile networking. IEEE Commun. Mag. 54, 52–59 (2016)
Li, B., Ma, M.D., Yang, X.B.: Perceptive forwaiding in content-centric networks. IEEE Access. 5, 4595–4605 (2017)
Asghar, M.R., Bernardini, C., Crispo, B.: PROTECTOR: privacy-preserving information lookup in content-centric networks. In: IEEE International Conference on Communications, pp. 1–7. IEEE Press, New York (2016)
Xia, Z., Zhu, Y., Sun, X., Qin, Z., Ren, K.: Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Cloud Comput. 99, 1–1 (2015)
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016)
Xia, Z., Xiong, N.N., Vasilakos, A.V., Sun, X.: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. 387, 195–204 (2017)
Goel, P., Holmberg, E., Konezny, M., Ayyagari, R., Sillman, D.: CCNx packet processing on PARC router platform. In: 2nd ACM Conference on Information-Centric Networking, pp. 211–212. ACM, New York (2015)
Chaabane, A., Cristofaro, E.D., Kaafar, M.A., Uzun, E.: Privacy in content-oriented networking: threats and contermesures. ACM SIGCOMM Comput. Commun. Rev. 43, 25–33 (2013)
Fotiou, N., Trossen, D., Marias, G.F., Kostopoulos, A., Polyzos, G.C.: Enhancing information lookup privacy through homomorphic encryption. Secur. Commun. Netw. 7, 2804–2814 (2013)
Mannes, E., Maziero, C., Lassance, L.C., Borges, F.: Controle de acesso baseado em reencriptação por proxy em Redes Centradas em Informação. In: 14th Brazilian Symposium on Information and Computing Systems Security, pp. 2–15. SBC Press (2014)
Tournai, R., Misra, S., Kliewer, J., Ortegel, S., Mick, T.: Catch me if you can: a practial framwork to evade censorship in information certirc networks. In: 2nd ACM Conference on Information-Centric Networking, pp. 167–176. ACM, New York (2015)
Tsudik, G., Uzun, E., Wood, C.A.: AC3N: anonymous communication in content-centric networking. In: 13rd IEEE Annual Consumer Communications & Networking Conference, pp. 988–991. IEEE Press, New York (2016)
Wang, X., Mu, Y.: Content-based encryption. In: Liu, J.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9723, pp. 57–72. Springer, Cham (2016). doi:10.1007/978-3-319-40367-0_4
Lin, X.Y., Tang, S.H., Xu, L.L., Wang, H.Q., Chen, J.: Two-factor data access control with efficient revocation for multi-authority cloud storage systems. IEEE Access 5, 393–405 (2017)
Qian, H.L., Li, J.G., Zhang, Y.C., Han, G.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14, 487–497 (2015)
Acknowledgements
This study was supported by the Open Foundation of State key Laboratory of Networking and Switching Technology (Beijing University of Posts and Telecommunications) under grant SKLNST-2016-2-11.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Guo, R., Li, X., Zheng, D. (2017). Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-68542-7_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68541-0
Online ISBN: 978-3-319-68542-7
eBook Packages: Computer ScienceComputer Science (R0)