Abstract
With the development in cloud storage, hospitals outsource the encrypted electronic medical records to the cloud services for economic saving. A cloud medical environment where the attribute is frequently updated, the existing searchable encryption schemes cannot support both ciphertext search and fine-grained access control. Therefore, combining ciphertext policy attribute-based encryption with searchable encryption technology, a cryptographic retrieval scheme supporting attribute update is proposed. Attributes can be updated frequently and partial decryption is transferred to the cloud storage server. Security analysis shows that the scheme can protect security and privacy under the DBDH assumption and the experimental results with real data show that the scheme is an efficient and practical application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Renwick, S., Martin, K.: Practical architectures for deployment of searchable encryption in a cloud environment. Cryptography 1(3), 19 (2017)
Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. Crypto 32(3), 213–229 (2001)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy IEEE Computer Society, pp. 321–334 (2007)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_4
Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: ACM Conference on Computer and Communications Security, pp. 417–426. ACM (2008)
Hur, J., Dong, K.N.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2011)
Qiang, L., Dengguo, F., Liwu, Z.: Attribute-based authenticated key agreement protocol supporting revocation. J. Commun. 35(5), 33–43 (2014)
Begum, S.J., Yasin, S.: A fine-grained control of revocable data access for multi-authority cloud storage. Int. J. Comput. Sci. Mechatron. 86–90 (2015)
Naruse, T., Mohri, M., Shiraishi, Y.: Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Hum.-Centric Comput. Inf. Sci. 5(1), 8 (2015)
Pirretti, M., Traynor, P., Mcdaniel, P., et al.: Secure attribute-based systems, pp. 99–112. IOS Press (2006)
Zu, L., Liu, Z., Li, J.: New ciphertext-policy attribute-based encryption with efficient revocation. In: IEEE International Conference on Computer and Information Technology, pp. 281–287. IEEE (2014)
Tao, Q., Huang, X.F.: Multi-authority ciphertext-policy attribute-based encryption scheme. J. Wuhan Univ. (Nat. Sci. Ed.) 61(6), 545–548 (2015)
Jung, T., Li, X.Y., Wan, Z., et al.: Privacy preserving cloud data access with multi-authorities. In: Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM 2013), pp. 2625–2633. IEEE (2013)
Acknowledgement
This research was supported by the National Natural Science Foundation of China (no. 61661019), the Natural Science Foundation of Hainan Province (no. 617079), the Higher Education Reform Key Project of Hainan Province (no. Hnjg2017ZD-1), the National Natural Science Foundation of China (61762033); The National Natural Science Foundation of Hainan (617048, 2018CXTD333).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Jingzhang, S., Chunjie, C., Hui, L. (2018). Searchable Encryption Scheme Based on CPABE with Attribute Update in a Cloud Medical Environment. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)