Jing Huang, Detao Tang, Chenyu Jiang, Fulong Chen, Ji Zhang, Dong Xie, Taochun Wang, Chuanxin Zhao, Chao Wang, Jintao Li
{"title":"基于 CP-ABE 的部分策略隐藏式医疗数据访问控制方法","authors":"Jing Huang, Detao Tang, Chenyu Jiang, Fulong Chen, Ji Zhang, Dong Xie, Taochun Wang, Chuanxin Zhao, Chao Wang, Jintao Li","doi":"10.1007/s12652-024-04843-6","DOIUrl":null,"url":null,"abstract":"<p>The secure sharing and privacy protection of medical data are of great significance during the development of smart medical care. In order to achieve data sharing among medical institutions, ciphertext-policy attribute-based encryption (CP-ABE), a potential technology, allows users to encrypt data under access policies which are defined on certain attributes of the data consumer, and only allows the data consumer to decrypt those attributes conforming to the access policy. However, some existing CP-ABE schemes still have some shortcomings. For example, the efficiency of encryption and decryption is not high enough, and some cannot support more sufficient and expressive access structures. To solve the above problems, combined with blockchain, this paper presents a CP-ABE scheme with partial policy hiding based on prime order bilinear groups. Extensive experiment and analysis results reveal that the proposed scheme protects the privacy of users and realizes that attribute values are hidden in the access policy.</p>","PeriodicalId":14959,"journal":{"name":"Journal of Ambient Intelligence and Humanized Computing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Partial policy hidden medical data access control method based on CP-ABE\",\"authors\":\"Jing Huang, Detao Tang, Chenyu Jiang, Fulong Chen, Ji Zhang, Dong Xie, Taochun Wang, Chuanxin Zhao, Chao Wang, Jintao Li\",\"doi\":\"10.1007/s12652-024-04843-6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The secure sharing and privacy protection of medical data are of great significance during the development of smart medical care. In order to achieve data sharing among medical institutions, ciphertext-policy attribute-based encryption (CP-ABE), a potential technology, allows users to encrypt data under access policies which are defined on certain attributes of the data consumer, and only allows the data consumer to decrypt those attributes conforming to the access policy. However, some existing CP-ABE schemes still have some shortcomings. For example, the efficiency of encryption and decryption is not high enough, and some cannot support more sufficient and expressive access structures. To solve the above problems, combined with blockchain, this paper presents a CP-ABE scheme with partial policy hiding based on prime order bilinear groups. Extensive experiment and analysis results reveal that the proposed scheme protects the privacy of users and realizes that attribute values are hidden in the access policy.</p>\",\"PeriodicalId\":14959,\"journal\":{\"name\":\"Journal of Ambient Intelligence and Humanized Computing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Ambient Intelligence and Humanized Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s12652-024-04843-6\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Ambient Intelligence and Humanized Computing","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12652-024-04843-6","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Computer Science","Score":null,"Total":0}
Partial policy hidden medical data access control method based on CP-ABE
The secure sharing and privacy protection of medical data are of great significance during the development of smart medical care. In order to achieve data sharing among medical institutions, ciphertext-policy attribute-based encryption (CP-ABE), a potential technology, allows users to encrypt data under access policies which are defined on certain attributes of the data consumer, and only allows the data consumer to decrypt those attributes conforming to the access policy. However, some existing CP-ABE schemes still have some shortcomings. For example, the efficiency of encryption and decryption is not high enough, and some cannot support more sufficient and expressive access structures. To solve the above problems, combined with blockchain, this paper presents a CP-ABE scheme with partial policy hiding based on prime order bilinear groups. Extensive experiment and analysis results reveal that the proposed scheme protects the privacy of users and realizes that attribute values are hidden in the access policy.
期刊介绍:
The purpose of JAIHC is to provide a high profile, leading edge forum for academics, industrial professionals, educators and policy makers involved in the field to contribute, to disseminate the most innovative researches and developments of all aspects of ambient intelligence and humanized computing, such as intelligent/smart objects, environments/spaces, and systems. The journal discusses various technical, safety, personal, social, physical, political, artistic and economic issues. The research topics covered by the journal are (but not limited to):
Pervasive/Ubiquitous Computing and Applications
Cognitive wireless sensor network
Embedded Systems and Software
Mobile Computing and Wireless Communications
Next Generation Multimedia Systems
Security, Privacy and Trust
Service and Semantic Computing
Advanced Networking Architectures
Dependable, Reliable and Autonomic Computing
Embedded Smart Agents
Context awareness, social sensing and inference
Multi modal interaction design
Ergonomics and product prototyping
Intelligent and self-organizing transportation networks & services
Healthcare Systems
Virtual Humans & Virtual Worlds
Wearables sensors and actuators