Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment

Published: 01 November 2023 Publication History

Abstract

The cloud-based sharing of electronic health data (EHDs) has great significance in researching diseases, doctors’ diagnoses and various fields. In this paper, we applied the potentiality of both blockchain and public key searchable encryption to build a medical data-sharing platform. In recent years, blockchain has emerged as a promising solution for medical data sharing with security and privacy preservation due to its immutability, decentralization, anonymity and verifiability advantages. Two kinds of blockchains, private blockchain and consortium blockchain, are used in our model. In our model, we have designed a consortium blockchain of preselected users. To achieve data security, access control, privacy preservation and secure search, public key encryption with keyword search (PEKS) technology is used here. According to the security proof, our proposed scheme is indistinguishable under the keyword guessing attack. The outcomes of the performance analysis and comparison simulations reveal that the proposed scheme performs better than other related schemes.

References

[1]
Chen Lanxiang, Lee Wai-Kong, Chang Chin-Chen, Choo Kim-Kwang Raymond, Zhang Nan, Blockchain based searchable encryption for electronic health record sharing, Future Gener Comput Syst 95 (2019) 420–429.
[2]
Zhang Aiqing, Lin Xiaodong, Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain, J Med Syst 42 (8) (2018) 140.
[3]
Yang Xiaodong, Wang Jiaqi, Xi Wanting, Tian Tian, Wang Caifen, A blockchain-based keyword search scheme with dual authorization for electronic health record sharing, J Inf Secur Appl 66 (2022).
[4]
Song Dawn Xiaoding, Wagner David, Perrig Adrian, Practical techniques for searches on encrypted data, in: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, IEEE, 2000, pp. 44–55.
[5]
Boneh Dan, Di Crescenzo Giovanni, Ostrovsky Rafail, Persiano Giuseppe, Public key encryption with keyword search, in: International conference on the theory and applications of cryptographic techniques, Springer, 2004, pp. 506–522.
[6]
Baek Joonsang, Safavi-Naini Reihaneh, Susilo Willy, Public key encryption with keyword search revisited, in: International conference on computational science and its applications, Springer, 2008, pp. 1249–1259.
[7]
Rhee Hyun Sook, Park Jong Hwan, Susilo Willy, Lee Dong Hoon. Improved searchable public key encryption with designated tester. In: Proceedings of the 4th international symposium on information, computer, and communications security. 2009, p. 376–9.
[8]
Tang Qiang, Public key encryption schemes supporting equality test with authorisation of different granularity, Int J Appl Cryptogr 2 (4) (2012) 304–321.
[9]
Ma Sha, Huang Qiong, Zhang Mingwu, Yang Bo, Efficient public key encryption with equality test supporting flexible authorization, IEEE Trans Inf Forensics Secur 10 (3) (2014) 458–470.
[10]
Sun Wenhai, Yu Shucheng, Lou Wenjing, Hou Y Thomas, Li Hui, Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, IEEE Trans Parallel Distrib Syst 27 (4) (2014) 1187–1198.
[11]
Su Hang, Zhu Zhiqiang, Sun Lei, Online/offline attribute-based encryption with keyword search against Keyword Guessing Attack, in: 2017 3rd IEEE international conference on computer and communications (ICCC), IEEE, 2017, pp. 1487–1492.
[12]
Arriaga Afonso, Tang Qiang, Ryan Peter, Trapdoor privacy in asymmetric searchable encryption schemes, in: International conference on cryptology in Africa, Springer, 2014, pp. 31–50.
[13]
Golle Philippe, Staddon Jessica, Waters Brent, Secure conjunctive keyword search over encrypted data, in: International conference on applied cryptography and network security, Springer, 2004, pp. 31–45.
[14]
Lv Zhiquan, Hong Cheng, Zhang Min, Feng Dengguo, Expressive and secure searchable encryption in the public key setting, in: International conference on information security, Springer, 2014, pp. 364–376.
[15]
Park Dong Jin, Kim Kihyun, Lee Pil Joong, Public key encryption with conjunctive field keyword search, in: International workshop on information security applications, Springer, 2004, pp. 73–86.
[16]
Cao Ning, Wang Cong, Li Ming, Ren Kui, Lou Wenjing, Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Trans Parallel Distrib Syst 25 (1) (2013) 222–233.
[17]
Li Hongwei, Liu Dongxiao, Dai Yuanshun, Luan Tom H, Shen Xuemin Sherman, Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage, IEEE Trans Emerg Top Comput 3 (1) (2014) 127–138.
[18]
Hu Chengyu, Liu Pengtao, A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension, in: International conference on computer science, environment, ecoinformatics, and education, Springer, 2011, pp. 131–136.
[19]
Hu Chengyu, Liu Pengtao, An enhanced searchable public key encryption scheme with a designated tester and its extensions, J Comput 7 (3) (2012) 716–723.
[20]
Ni Jianbing, Yu Yong, Xia Qi, Niu Lei, Cryptanalysis of two searchable public key encryption schemes with a designated tester, J Inf Comput Sci 9 (16) (2012) 4819–4825.
[21]
Huang Qiong, Li Hongbo, An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks, Inform Sci 403 (2017) 1–14.
[22]
Liu Chang, Zhu Liehuang, Wang Mingzhong, Tan Yu-an, Search pattern leakage in searchable encryption: Attacks and new construction, Inform Sci 265 (2014) 176–188.
[23]
Li Jiguo, Wang Min, Lu Yang, Zhang Yichen, Wang Huaqun, ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack, Comput Stand Interfaces 74 (2021).
[24]
Lu Yang, Li Jiguo, Zhang Yichen, Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks, IEEE Trans Serv Comput 14 (6) (2019) 2041–2054.
[25]
Lu Yang, Li Jiguo, Lightweight public key authenticated encryption with keyword search against adaptively-chosen-targets adversaries for mobile devices, IEEE Trans Mob Comput 21 (12) (2021) 4397–4409.
[26]
Li Jiguo, Zhang Yichen, Ning Jianting, Huang Xinyi, Poh Geong Sen, Wang Debang, Attribute based encryption with privacy protection and accountability for CloudIoT, IEEE Trans Cloud Comput 10 (2) (2020) 762–773.
[27]
Li Jiguo, Lin Xiaonan, Zhang Yichen, Han Jinguang, KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage, IEEE Trans Serv Comput 10 (5) (2016) 715–725.
[28]
Lu Yang, Li Jiguo, Zhang Yichen, Privacy-preserving and pairing-free multirecipient certificateless encryption with keyword search for cloud-assisted IIoT, IEEE Internet Things J 7 (4) (2019) 2553–2562.
[29]
Ghosh Sudeep, Islam SK Hafizul, Bisht Abhishek, Das Ashok Kumar, Provably secure public key encryption with keyword search for data outsourcing in cloud environments, J Syst Archit 139 (2023).
[30]
Lu Yang, Li Jiguo, Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems, Cluster Comput 22 (2019) 285–299.
[31]
Guo Lifeng, Yau Wei-Chuen, Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage, J Med Syst 39 (2015) 1–11.
[32]
Wu Yilun, Lu Xicheng, Su Jinshu, Chen Peixin, An efficient searchable encryption against keyword guessing attacks for sharable electronic medical records in cloud-based system, J Med Syst 40 (2016) 1–9.
[33]
Tang Xinyu, Guo Cheng, Choo Kim-Kwang Raymond, Liu Yining, Li Long, A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain, Comput Netw 200 (2021).
[34]
Sookhak Mehdi, Jabbarpour Mohammad Reza, Safa Nader Sohrabi, Yu F Richard, Blockchain and smart contract for access control in healthcare: a survey, issues and challenges, and open issues, J Netw Comput Appl 178 (2021).
[35]
Niu Shufen, Chen Lixia, Wang Jinfeng, Yu Fei, Electronic health record sharing scheme with searchable attribute-based encryption on blockchain, IEEE Access 8 (2019) 7195–7204.
[36]
Shamshad Salman, Mahmood Khalid, Kumari Saru, Chen Chien-Ming, et al., A secure blockchain-based e-health records storage and sharing scheme, J Inf Secur Appl 55 (2020).
[37]
Yue Xiao, Wang Huiju, Jin Dawei, Li Mingqiang, Jiang Wei, Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control, J Med Syst 40 (2016) 1–8.
[38]
Zyskind Guy, Nathan Oz, et al., Decentralizing privacy: Using blockchain to protect personal data, in: 2015 IEEE security and privacy workshops, IEEE, 2015, pp. 180–184.
[39]
Kuo Tsung-Ting, Kim Hyeon-Eui, Ohno-Machado Lucila, Blockchain distributed ledger technologies for biomedical and health care applications, J Amer Med Inform Assoc 24 (6) (2017) 1211–1220.
[40]
Hussien Hassan Mansur, Yasin Sharifah Md, Udzir Nur Izura, Ninggal Mohd Izuan Hafez, Salman Sadeq, Blockchain technology in the healthcare industry: Trends and opportunities, J Ind Inf Integr 22 (2021).
[41]
Alsayegh Muneera, Moulahi Tarek, Alabdulatif Abdulatif, Lorenz Pascal, Towards secure searchable electronic health records using consortium blockchain, Network 2 (2) (2022) 239–256.
[42]
Boneh Dan, Franklin Matt, Identity-based encryption from the Weil pairing, in: Annual international cryptology conference, Springer, 2001, pp. 213–229.
[43]
Boyen Xavier, The uber-assumption family, in: International conference on pairing-based cryptography, Springer, 2008, pp. 39–56.
[44]
Joux Antoine, A one round protocol for tripartite Diffie–Hellman, in: International algorithmic number theory symposium, Springer, 2000, pp. 385–393.
[45]
Abdalla Michel, Bellare Mihir, Rogaway Phillip, The oracle Diffie-Hellman assumptions and an analysis of DHIES, in: Cryptographers’ track at the RSA conference, Springer, 2001, pp. 143–158.
[46]
Esposito Christian, De Santis Alfredo, Tortora Genny, Chang Henry, Choo Kim-Kwang Raymond, Blockchain: A panacea for healthcare cloud-based data security and privacy?, IEEE Cloud Comput 5 (1) (2018) 31–37.
[47]
Raghav Nidhi, Bhola Anoop, Blockchain based privacy preservation in healthcare: a recent trends and challenges, Psychol Educ J 58 (2021) 5315–5324.
[48]
Hussien Hassan Mansur, Yasin Sharifah Md, Udzir SNI, Zaidan Aws Alaa, Zaidan Bilal Bahaa, A systematic review for enabling of develop a blockchain technology in healthcare application: taxonomy, substantially analysis, motivations, challenges, recommendations and future direction, J Med Syst 43 (2019) 1–35.
[49]
Feng Libo, Zhang Hui, Tsai Wei-Tek, Sun Simeng, System architecture for high-performance permissioned blockchains, Front Comput Sci 13 (2019) 1151–1165.
[50]
Gupta Brij B, Li Kuan-Ching, Leung Victor CM, Psannis Kostas E, Yamaguchi Shingo, et al., Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system, IEEE/CAA J Autom Sin 8 (12) (2021) 1877–1890.
[51]
Androulaki Elli, Barger Artem, Bortnikov Vita, Cachin Christian, Christidis Konstantinos, De Caro Angelo, Enyeart David, Ferris Christopher, Laventman Gennady, Manevich Yacov, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth eurosys conference. 2018, p. 1–15.
[52]
Chase Brad, MacBrough Ethan, Analysis of the XRP ledger consensus protocol, 2018, arXiv preprint arXiv:1802.07242.
[53]
Rhee Hyun Sook, Park Jong Hwan, Susilo Willy, Lee Dong Hoon, Trapdoor security in a searchable public-key encryption scheme with a designated tester, J Syst Softw 83 (5) (2010) 763–771.
[54]
Coron Jean-Sébastien, On the exact security of full domain hash, in: Annual international cryptology conference, Springer, 2000, pp. 229–235.
[55]
Lynn Ben, PBC library manual 0.5. 11, 2006, https://crypto.stanford.edu/pbc/.
[56]
Wang Yong, Zhang Aiqing, Zhang Peiyun, Wang Huaqun, Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain, Ieee Access 7 (2019) 136704–136719.
[57]
Ma Mimi, He Debiao, Fan Shuqin, Feng Dengguo, Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare, J Inf Secur Appl 50 (2020).

Cited By

View all
  • (2024)An Efficient Secure Sharing of Electronic Health Records Using IoT-Based Hyperledger BlockchainInternational Journal of Intelligent Systems10.1155/2024/69952022024Online publication date: 1-Jan-2024

Index Terms

  1. Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Journal of Information Security and Applications
    Journal of Information Security and Applications  Volume 78, Issue C
    Nov 2023
    462 pages

    Publisher

    Elsevier Science Inc.

    United States

    Publication History

    Published: 01 November 2023

    Author Tags

    1. Electronic health data
    2. Cloud server
    3. Public key encryption
    4. Keyword search
    5. Blockchain

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)An Efficient Secure Sharing of Electronic Health Records Using IoT-Based Hyperledger BlockchainInternational Journal of Intelligent Systems10.1155/2024/69952022024Online publication date: 1-Jan-2024

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media