1,374
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth

, ORCID Icon, , , &
Article: 2186316 | Received 04 Dec 2022, Accepted 27 Feb 2023, Published online: 15 Mar 2023

References

  • Ahamad, S. S., & Khan Pathan, A. (2021). A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic. Connection Science, 33(3), 532–554. https://doi.org/10.1080/09540091.2020.1854180
  • Akinyele, J. A., Pagano, M. W., Green, M. D., Lehmann, C. U., Peterson, Z. N., & A. D. Rubin. (2011). Securing electronic medical records using attribute-based encryption on mobile devices, In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (pp. 75–86). ACM.
  • Ba, Y., Hu, X., Chen, Y., Hao, Z., Li, X., & Yan, X. (2021). A blockchain-based CP-ABE scheme with partially hidden access structures. Security and Communication Networks, 2021(1), 1–16. https://doi.org/10.1155/2021/4132597
  • Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., & Attia, R. (2018). Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot. Computer Networks, 133(Mar.14), 141–156. https://doi.org/10.1016/j.comnet.2018.01.036
  • Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (sp'07) (pp. 321–334). IEEE.
  • Chen, Y., Li, W., Gao, F., Yin, W., Liang, K., Zhang, H., & Wen, Q. (2019). Efficient attribute-based data sharing scheme with hidden access structures. The Computer Journal, 62(12), 1748–1760. https://doi.org/10.1093/comjnl/bxz052
  • Cheung, L., & Newport, C. (2007). Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (pp. 456–465). ACM.
  • Cui, H., Deng, R. H., Lai, J., Yi, X., & Nepal, S. (2018). An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited. Computer Networks, 133(Mar.14), 157–165. https://doi.org/10.1016/j.comnet.2018.01.034.
  • Cui, H., Deng, R. H., Wu, G., & Lai, J. (2016). An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures. In: International Conference on Provable Security (pp. 19–38). Springer.
  • Delmolino, K., Arnett, M., Kosba, A., Miller, A., & Shi, E. (2016). Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In: International Conference on Financial Cryptography and Data Security (pp. 79–94). Springer.
  • Even, S., Goldreich, O., & Micali, S. (1989). On-line/off-line digital signatures. In: Conference on the Theory and Application of Cryptology (pp. 263–275). Springer.
  • Gan, T., Liao, Y., Liang, Y., Zhou, Z., & Zhang, G. (2021). Partial policy hiding attribute-based encryption in vehicular fog computing. Soft Computing, 25(16), 10543–10559. https://doi.org/10.1007/s00500-021-05996-8
  • Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (pp. 89–98). ACM.
  • Green, M., Hohenberger, S., & Waters, B. (2011). Outsourcing the decryption of ABE ciphertexts. In: 20th USENIX Security Symposium (USENIX Security 11). USENIX Association.
  • Hohenberger, S., & Waters, B. (2014). Online/offline attribute-based encryption. In: International Workshop on Public Key Cryptography (pp. 293–310). Springer.
  • Hu, G., Zhang, L., Mu, Y., & Gao, X. (2020). An expressive ‘Test-Decrypt-Verify’ attribute-based encryption scheme with hidden policy for smart medical cloud. IEEE Systems Journal, 15(1), 365–376. https://doi.org/10.1109/JSYST.2020.2996216
  • Hu, J., Liang, W., Hosam, O., Hsieh, M., & Su, X. (2022). 5GSS: A framework for 5G-secure-smart healthcare monitoring. Connection Science, 34(1), 139–161. https://doi.org/10.1080/09540091.2021.1977243
  • Ibraimi, L., Asim, M., & Petković, M. (2009). Secure management of personal health records by applying attribute-based encryption. In: Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health (pp. 71–74). IEEE.
  • Ji, H., Zhang, H., Shao, L., He, D., & Luo, M. (2021). An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud. Connection Science, 33(4), 1094–1115. https://doi.org/10.1080/09540091.2020.1858757
  • Kim, I., Susilo, W., Baek, J., & Kim, J. (2020). Harnessing policy authenticity for hidden ciphertext policy attribute based encryption. IEEE Transactions on Dependable and Secure Computing, 19(3), 1856–1870. https://doi.org/10.1109/TDSC.2020.3040712
  • Lai, J., Deng, R. H., Guan, C., & Weng, J. (2013). Attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 8(8), 1343–1354. https://doi.org/10.1109/TIFS.2013.2271848
  • Lai, J., Deng, R. H., & Li, Y. (2012). Expressive CP-ABE with partially hidden access structures. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (pp. 18–19). ACM.
  • Li, J., Wang, H., Zhang, Y., & Shen, J. (2016). Ciphertext-policy attribute-based encryption with hidden access policy and testing. KSII Transactions on Internet and Information Systems (TIIS), 10(7), 3339–3352. https://doi.org/10.3837/tiis.2016.07.026
  • Li, Q., Zhang, Y., Zhang, T., Huang, H., He, Y., & Xiong, J. (2020). HTAC: Fine-grained policy-hiding and traceable access control in mHealth. IEEE Access, 8, 123430–123439. https://doi.org/10.1109/Access.6287639
  • Lin, S., Zhang, R., Ma, H., & Wang, M. (2015). Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 10(10), 2119–2130. https://doi.org/10.1109/TIFS.2015.2449264
  • Liu, L., Lai, J., Deng, R. H., & Li, Y. (2016). Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Security and Communication Networks, 9(18), 4897–4913. https://doi.org/10.1002/sec.v9.18
  • Liu, Y., Zhang, Y., Ling, J., & Liu, Z. (2018). Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Future Generation Computer Systems, 78(3), 1020–1026. https://doi.org/10.1016/j.future.2016.12.027.
  • Mao, X., Lai, J., Mei, Q., Chen, K., & Weng, J. (2015). Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Dependable and Secure Computing, 13(5), 533–546. https://doi.org/10.1109/TDSC.2015.2423669
  • Nishide, T., Yoneyama, K., & Ohta, K. (2008). Attribute-based encryption with partially hidden encryptorspecified access structures. International Conference on Applied Cryptography and Network Security (pp. 111–129). Springer.
  • Phuong, T. V. X., Yang, G., & Susilo, W. (2015). Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Transactions on Information Forensics and Security, 11(1), 35–45. https://doi.org/10.1109/TIFS.2015.2475723
  • Qin, B., Deng, R. H., Liu, S., & Ma, S. (2015). Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 10(7), 1384–1393. https://doi.org/10.1109/TIFS.2015.2410137
  • Qiu, S., Liu, J., Shi, Y., & Zhang, R. (2017). Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Science China Information Sciences, 60(5), 1–12. https://doi.org/10.1007/s11432-015-5449-9
  • Ren, H., Li, H., Dai, Y., Yang, K., & Lin, X. (2018). Querying in internet of things with privacy preserving: Challenges, solutions and opportunities. IEEE Network, 32(6), 144–151. https://doi.org/10.1109/MNET.2018.1700374
  • Rouselakis, Y., & Waters, B. (2013). Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (pp. 463–474). ACM.
  • Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 457–473). Springer.
  • Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76(Jan.15), 146–164. https://doi.org/10.1016/j.comnet.2014.11.008.
  • Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography (pp. 53–70). Springer.
  • Xu, G., Li, H., Dai, Y., Yang, K., & Lin, X. (2019). Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Transactions on Information Forensics and Security, 14(4), 870–885. 10.1109/TIFS.2018.2868162
  • Yan, X., He, G., Yu, J., Tang, Y., & Zhao, M. (2020). Offline/online outsourced attribute-based encryption with partial policy hidden for the internet of things. Journal of Sensors , 2020(1), 1–11. https://doi.org/10.1155/2020/8861114
  • Zeng, P., Zhang, Z., Lu, R., & Choo, K. K. R. (2021). Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things. IEEE Internet of Things Journal, 8(13), 10963–10972. https://doi.org/10.1109/JIOT.2021.3051362
  • Zhang, J., Cheng, Z., Cheng, X., & Chen, B. (2021). OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems. Connection Science, 33(4), 1060–1076. https://doi.org/10.1080/09540091.2020.1841096
  • Zhang, L., Hu, G., Mu, Y., & Rezaeibagha, F. (2019). Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system. IEEE Access, 7, 33202–33213. https://doi.org/10.1109/ACCESS.2019.2902040
  • Zhang, L., Wu, Q., Mu, Y., & Zhang, J. (2016). Privacy-preserving and secure sharing of PHR in the cloud. Journal of Medical Systems, 40(12), 1–13. https://doi.org/10.1007/s10916-016-0595-1
  • Zhang, S., Wang, Y., & Zhou, W. (2019). Towards secure 5G networks: A survey. Computer Networks, 162(Oct.24), 106871.1–106871.22. https://doi.org/10.1016/j.comnet.2019.106871.
  • Zhang, W., Zhang, Z., Xiong, H., & Qin, Z. (2022). PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system. Journal of Ambient Intelligence and Humanized Computing, 13(1), 613–627. https://doi.org/10.1007/s12652-021-02922-6
  • Zhang, Y. (2018). Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet of Things Journal, 5(3), 2130–2145. https://doi.org/10.1109/JIOT.2018.2825289
  • Zhang, Y., Chen, X., Li, J., Wong, D. S., & Li, H. (2013). Anonymous attribute-based encryption supporting efficient decryption test. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (pp. 511–516). ACM.
  • Zhang, Y., Wu, A., & Zheng, D. (2018). Efficient and privacy-aware attribute-based data sharing in mobile cloud computing. Journal of Ambient Intelligence and Humanized Computing, 9(4), 1039–1048. https://doi.org/10.1007/s12652-017-0509-1
  • Zhang, Z., Zhang, W., & Qin, Z. (2021). A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing. Future Generation Computer Systems, 123, 181–195. https://doi.org/10.1016/j.future.2021.04.022.