Xin Liu , Hao Wang , Bo Zhang , Yongjun Zhang , Bin Zhang
{"title":"使用可验证的外包解密和加密反向防火墙保护医疗数据共享","authors":"Xin Liu , Hao Wang , Bo Zhang , Yongjun Zhang , Bin Zhang","doi":"10.1016/j.jisa.2025.104050","DOIUrl":null,"url":null,"abstract":"<div><div>In the current era of smart healthcare, patients’ electronic health records (EHR) are typically stored in the cloud. However, healthcare institutions require a patient-centric access control mechanism to securely share EHR and prevent information leaks. While attribute-based encryption (ABE) holds potential for EHR access control, it often faces risks such as single-point failures and lacks verifiability for outsourced decryption. Backdoor programs can also compromise system security, threatening patient privacy. To address these challenges, we extended Lewko et al.’s multi-authority ABE scheme to create an online/offline ciphertext policy attribute-based key encapsulation mechanism with verifiable outsourced decryption and cryptographic reverse firewalls (OO-CP-AB-KEM-OD-CRF). Building on this mechanism, we developed a multi-authority EHR access control system to prevent the exfiltration of sensitive information. Compared with similar schemes, the OO-CP-AB-KEM-OD-CRF scheme supports user authentication and verifiable outsourced decryption, providing resilience against insider threats. Both theoretical evaluation and empirical testing indicate that our scheme surpasses similar ones in functionality and security while maintaining comparable performance despite the additional security features.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104050"},"PeriodicalIF":3.8000,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure medical data sharing with verifiable outsourced decryption and cryptographic reverse firewalls\",\"authors\":\"Xin Liu , Hao Wang , Bo Zhang , Yongjun Zhang , Bin Zhang\",\"doi\":\"10.1016/j.jisa.2025.104050\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In the current era of smart healthcare, patients’ electronic health records (EHR) are typically stored in the cloud. However, healthcare institutions require a patient-centric access control mechanism to securely share EHR and prevent information leaks. While attribute-based encryption (ABE) holds potential for EHR access control, it often faces risks such as single-point failures and lacks verifiability for outsourced decryption. Backdoor programs can also compromise system security, threatening patient privacy. To address these challenges, we extended Lewko et al.’s multi-authority ABE scheme to create an online/offline ciphertext policy attribute-based key encapsulation mechanism with verifiable outsourced decryption and cryptographic reverse firewalls (OO-CP-AB-KEM-OD-CRF). Building on this mechanism, we developed a multi-authority EHR access control system to prevent the exfiltration of sensitive information. Compared with similar schemes, the OO-CP-AB-KEM-OD-CRF scheme supports user authentication and verifiable outsourced decryption, providing resilience against insider threats. Both theoretical evaluation and empirical testing indicate that our scheme surpasses similar ones in functionality and security while maintaining comparable performance despite the additional security features.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"90 \",\"pages\":\"Article 104050\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2025-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625000870\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625000870","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Secure medical data sharing with verifiable outsourced decryption and cryptographic reverse firewalls
In the current era of smart healthcare, patients’ electronic health records (EHR) are typically stored in the cloud. However, healthcare institutions require a patient-centric access control mechanism to securely share EHR and prevent information leaks. While attribute-based encryption (ABE) holds potential for EHR access control, it often faces risks such as single-point failures and lacks verifiability for outsourced decryption. Backdoor programs can also compromise system security, threatening patient privacy. To address these challenges, we extended Lewko et al.’s multi-authority ABE scheme to create an online/offline ciphertext policy attribute-based key encapsulation mechanism with verifiable outsourced decryption and cryptographic reverse firewalls (OO-CP-AB-KEM-OD-CRF). Building on this mechanism, we developed a multi-authority EHR access control system to prevent the exfiltration of sensitive information. Compared with similar schemes, the OO-CP-AB-KEM-OD-CRF scheme supports user authentication and verifiable outsourced decryption, providing resilience against insider threats. Both theoretical evaluation and empirical testing indicate that our scheme surpasses similar ones in functionality and security while maintaining comparable performance despite the additional security features.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.