Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

Delegatable searchable encryption with specified keywords for EHR systems

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

With the development of big data and cloud computing, more and more data owners store their data with encrypted form in the cloud server. To retrieve some data they are interested in, an important technology called searchable encryption can be adopted. Sometimes, the encrypted data are desired to be shared to some users by the data owners without destroying the user privacy. To address this problem, many works of delegated searchable encryption (DSE) have been studied. However, in the existing DSE schemes, the delegated users can make keyword search over the encrypted data without any restrictions. In some systems such as E-health record system in which the data are sensitive, it is desired that the delegated users can only make search with some specified keywords designated by the data owners. In this work, we present an efficient solution to this problem and give a concrete construction. Then we show that our construction is efficient and practical for real applications by experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Riad, K., Hamza, R., & Yan, H. (2019). Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access, 7, 86384–86393.

    Article  Google Scholar 

  2. Xu, X., He, C., Xu, Z., Qi, L., Wan, S., & Bhuiyan, M. Z. A. (2020). Joint optimization of offloading utility and privacy for edge computing enabled IoT. IEEE Internet of Things Journal, 7(4), 2622–2629.

    Article  Google Scholar 

  3. Xu, X., Zhang, X., Gao, H., Xue, Y., Qi, L., & Dou, W. (2020). Become: Blockchain-enabled computation offloading for IoT in mobile edge computing. IEEE Transactions on Industrial Informatics, 16(6), 4187–4195.

    Article  Google Scholar 

  4. Xiaolong, X., Liu, Q., Zhang, X., Zhang, J., Qi, L., & Dou, W. (2019). A blockchain-powered crowdsourcing method with privacy preservation in mobile environment. IEEE Transactions on Computational Social Systems, 6(6), 1407–1419.

    Article  Google Scholar 

  5. Hassan, A., Hamza, R., Yan, H., & Li, P. (2019). An efficient outsourced privacy preserving machine learning scheme with public verifiability. IEEE Access, 7, 146322–146330.

    Article  Google Scholar 

  6. Qi, L., Chen, Y., Yuan, Y., Fu, S., Zhang, X., & Xu, X. (2019). A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web (pp. 1–23).

  7. Hamza, R., Hassan, A., Huang, T., Ke, L., & Yan, H. (2019). An efficient cryptosystem for video surveillance in the internet of things environment. Complexity, 2019, 1–11. https://doi.org/10.1155/2019/1625678.

    Article  Google Scholar 

  8. Jiang, L., Li, T., Li, X., Atiquzzaman, M., Ahmad, H., & Wang, X. (2018). Anonymous communication via anonymous identity-based encryption and its application in IoT. Wireless Communications and Mobile Computing, 2018, 1–8. https://doi.org/10.1155/2018/6809796.

    Article  Google Scholar 

  9. Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Proceeding 2000 IEEE symposium on security and privacy. S&P 2000 (pp. 44–55). IEEE.

  10. Kamara, S., Papamanthou, C., & Roeder, T. (2012). Dynamic searchable symmetric encryption. In Proceedings of the 2012 ACM conference on computer and communications security (pp. 965–976).

  11. Kamara, S., & Papamanthou, C. (2013). Parallel and dynamic searchable symmetric encryption. In International conference on financial cryptography and data security (pp. 258–274). Berlin: Springer.

  12. Stefanov, E., Papamanthou, C., & Shi, E. (2014). Practical dynamic searchable encryption with small leakage. NDSS, 71, 72–75.

    Google Scholar 

  13. Hahn, F., & Kerschbaum, F. (2014). Searchable encryption with secure and efficient updates. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (pp. 310–320).

  14. Cash, D., & Tessaro, S. (2014). The locality of searchable symmetric encryption. In Annual international conference on the theory and applications of cryptographic techniques (pp. 351–368). Berlin: Springer.

  15. Qi, L., He, Q., Chen, F., Dou, W., Wan, S., Zhang, X., et al. (2019). Finding all you need: web apis recommendation in web of things through keywords search. IEEE Transactions on Computational Social Systems, 6(5), 1063–1072.

    Article  Google Scholar 

  16. Hwang, M.-S., Hsu, S.-T., & Lee, C.-C. (2014). A new public key encryption with conjunctive field keyword search scheme. Information Technology and Control, 43(3), 277–288.

    Article  Google Scholar 

  17. Ding, M., Gao, F., Jin, Z., & Zhang, H. (2012). An efficient public key encryption with conjunctive keyword search scheme based on pairings. In 2012 3rd IEEE international conference on network infrastructure and digital content (pp. 526–530). IEEE.

  18. Boneh, D., & Waters, B. (2007). Conjunctive, subset, and range queries on encrypted data. In Theory of cryptography conference (pp. 535–554). Berlin: Springer.

  19. Zhang, B., & Zhang, F. (2011). An efficient public key encryption with conjunctive-subset keywords search. Journal of Network and Computer Applications, 34(1), 262–267.

    Article  Google Scholar 

  20. Fang, L., Susilo, W., Ge, C., & Wang, J. (2012). Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theoretical Computer Science, 462, 39–58.

    Article  MathSciNet  Google Scholar 

  21. Camenisch, J., Kohlweiss, M., Rial, A., & Sheedy, C. (2009). Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In International workshop on public key cryptography (pp. 196–214). Berlin: Springer.

  22. Hamlin, A., Shelat, A., Weiss, M., & Wichs, D. (2018). Multi-key searchable encryption, revisited. In IACR international workshop on public key cryptography (pp. 95–124). Berlin: Springer.

  23. Li, H., Liu, D., Dai, Y., Luan, T. H., & Yu, S. (2015). Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Transactions on Emerging Topics in Computing, 6(1), 97–109.

    Article  Google Scholar 

  24. Liang, K., & Susilo, W. (2015). Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Transactions on Information Forensics and Security, 10(9), 1981–1992.

    Article  Google Scholar 

  25. Li, M., Yu, S., Cao, N., & Lou, W. (2011). Authorized private keyword search over encrypted data in cloud computing. In 2011 31st international conference on distributed computing systems (pp. 383–392). IEEE.

  26. Miao, Y., Ma, J., Liu, X., Wei, F., Liu, Z., & Wang, X. A. (2016). m 2-abks: Attribute-based multi-keyword search over encrypted personal health records in multi-owner setting. Journal of Medical Systems, 40(11), 246.

    Article  Google Scholar 

  27. Shao, J., Cao, Z., Liang, X., & Lin, H. (2010). Proxy re-encryption with keyword search. Information Sciences, 180(13), 2576–2587.

    Article  MathSciNet  Google Scholar 

  28. Shi, J., Lai, J., Li, Y., Deng, R. H., & Weng, J. (2014). Authorized keyword search on encrypted data. In European symposium on research in computer security (pp. 419–435). Berlin: Springer.

  29. Sun, W., Shucheng, Y., Lou, W., Thomas Hou, Y., & Li, H. (2014). Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Transactions on Parallel and Distributed Systems, 27(4), 1187–1198.

    Article  Google Scholar 

  30. Tang, Q. (2014). Nothing is for free: Security in searching shared and encrypted data. IEEE Transactions on Information Forensics and Security, 9(11), 1943–1952.

    Article  Google Scholar 

  31. An, W. X., Huang, X., Yang, X., Liu, L., & Xuguang, W. (2012). Further observation on proxy re-encryption with keyword search. Journal of Systems and Software, 85(3), 643–654.

    Article  Google Scholar 

  32. Yang, Y., & Ma, M. (2015). Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Transactions on Information Forensics and Security, 11(4), 746–759.

    Article  MathSciNet  Google Scholar 

  33. Zheng, Q., Xu, S., & Ateniese, G. (2014). VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In IEEE INFOCOM 2014-IEEE conference on computer communications (pp. 522–530). IEEE.

  34. Lee, C.-C., Li, C.-T., Chen, C.-L., & Chiu, S.-T. (2016). A searchable hierarchical conditional proxy re-encryption scheme for cloud storage services. Information Technology and Control, 45(3), 289–299.

    Article  Google Scholar 

  35. Shi, Y., Liu, J., Han, Z., Zheng, Q., Zhang, R., & Qiu, S. (2014). Attribute-based proxy re-encryption with keyword search. PloS ONE, 9(12), e116325.

    Article  Google Scholar 

  36. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Annual international cryptology conference (pp. 213–229). Berlin: Springer.

  37. Gentry, C. (2006). Practical identity-based encryption without random oracles. In Annual international conference on the theory and applications of cryptographic techniques (pp. 445–464). Berlin: Springer.

  38. Lynn, B. (2006). Pbc library manual 0.5. 11.

Download references

Acknowledgements

This work is supported by the Natural Science Foundation of Guangdong Province of China (No. 2018A030313957) and the Science and Technology Innovation Projects of Shenzhen (Nos. JCYJ20190809152003992, JCYJ20170818-140234295, JCYJ20170818144026871).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongyang Yan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, L., Sun, Z., Li, W. et al. Delegatable searchable encryption with specified keywords for EHR systems. Wireless Netw 30, 3547–3559 (2024). https://doi.org/10.1007/s11276-020-02410-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-020-02410-3

Keywords