Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme
The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development of digital healthcare systems by connecting available medical resources and healthcare services. However, there are concerns about the...
Saved in:
Published in: | Applied sciences Vol. 12; no. 21; p. 10812 |
---|---|
Main Authors: | , |
Format: | Journal Article |
Language: | English |
Published: |
Basel
MDPI AG
01-11-2022
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development of digital healthcare systems by connecting available medical resources and healthcare services. However, there are concerns about the security of sharing patients’ electronic health records. In response to the prevailing problems such as difficulties in sharing medical records between different hospitals and patients’ inability to grasp the usage of their medical records, we propose a patient-controlled and cloud-chain collaborative multi-authority attribute-based encryption for EHR sharing with verifiable outsourcing decryption and hiding access policies (VO-PH-MAABE). This scheme uses blockchain to store the validation parameters by utilizing its immutable, which data users use to verify the correctness of third-party outsourcing decryption results. In addition, we use policy-hiding technology to protect data privacy so that data security is guaranteed. Moreover, we use blockchain technology to establish trust among multiple authorities and utilize Shamir secret sharing and smart contracts to compute keys or tokens for attributes managed across multiple administrative domains, which avoids a single point of failure and reduces communication and computation overhead on the data user side. Finally, the ciphertext indistinguishability security under the chosen plaintext attack is demonstrated under the stochastic prediction model and compared with other schemes in terms of functionality, communication overhead, and computation overhead. The experimental results show the effectiveness of this scheme. |
---|---|
AbstractList | The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development of digital healthcare systems by connecting available medical resources and healthcare services. However, there are concerns about the security of sharing patients’ electronic health records. In response to the prevailing problems such as difficulties in sharing medical records between different hospitals and patients’ inability to grasp the usage of their medical records, we propose a patient-controlled and cloud-chain collaborative multi-authority attribute-based encryption for EHR sharing with verifiable outsourcing decryption and hiding access policies (VO-PH-MAABE). This scheme uses blockchain to store the validation parameters by utilizing its immutable, which data users use to verify the correctness of third-party outsourcing decryption results. In addition, we use policy-hiding technology to protect data privacy so that data security is guaranteed. Moreover, we use blockchain technology to establish trust among multiple authorities and utilize Shamir secret sharing and smart contracts to compute keys or tokens for attributes managed across multiple administrative domains, which avoids a single point of failure and reduces communication and computation overhead on the data user side. Finally, the ciphertext indistinguishability security under the chosen plaintext attack is demonstrated under the stochastic prediction model and compared with other schemes in terms of functionality, communication overhead, and computation overhead. The experimental results show the effectiveness of this scheme. |
Author | Zhang, Chenshuo Yang, Xiaohui |
Author_xml | – sequence: 1 givenname: Xiaohui orcidid: 0000-0003-0379-6326 surname: Yang fullname: Yang, Xiaohui – sequence: 2 givenname: Chenshuo surname: Zhang fullname: Zhang, Chenshuo |
BookMark | eNpNkUtLAzEUhYMoWB87f8CAW0fzaCbJsi31ARXBx9aQydzY1OlkTDIL_72jFfFu7uXwce6Bc4T2u9ABQmcEXzKm8JXpe0IpIVgSuocmFIuqZFMi9v_dh-g0pQ0eRxEmCZ6g13kb7LtdG9-Vc5OgKe6HNvu-hWI25HWIPntIxSzn6Oshwy-07Gz87LMPXeFCLJa3j8XMWkipWIQux9AWT3YNWzhBB860CU5_9zF6uV4-L27L1cPN3WK2Ki2rRC4FdQ0ntqLK8UYa6abKSQVSAEjJOXai4owSY03NHOdQwRRILagASmUtODtGdzvfJpiN7qPfmvipg_H6RwjxTZuYvW1BW8UpJgwDq-RUyKpW0ipcjzKhSjVm9DrfefUxfAyQst6EIXZjfE2FINWYh6iRuthRNoaUIri_rwTr70L0_0LYF-cuffA |
CitedBy_id | crossref_primary_10_1080_09540091_2023_2174081 crossref_primary_10_1002_cpe_8122 crossref_primary_10_1007_s11042_023_15846_4 |
Cites_doi | 10.1109/TETC.2019.2904637 10.1016/j.comnet.2019.02.008 10.1109/TPDS.2015.2448095 10.1016/j.jnca.2018.03.006 10.1007/s00500-016-2330-8 10.1109/JIOT.2021.3055541 10.1109/ACCESS.2019.2902040 10.1016/j.future.2019.03.008 10.1016/j.future.2019.04.003 10.1109/TIFS.2015.2410137 10.1109/ACCESS.2021.3052247 10.1109/TCC.2020.2975184 10.1109/NaNA51271.2020.00070 10.1109/JIOT.2021.3051362 10.1007/s12652-021-02922-6 10.1109/TIFS.2019.2911166 10.1177/1550147720906796 10.1109/TIFS.2013.2271848 10.1109/ACCESS.2020.2970272 10.1109/JIOT.2020.2993231 10.1145/2484313.2484381 |
ContentType | Journal Article |
Copyright | 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION ABUWG AFKRA AZQEC BENPR CCPQU DWQXO PIMPY PQEST PQQKQ PQUKI PRINS DOA |
DOI | 10.3390/app122110812 |
DatabaseName | CrossRef ProQuest Central (Alumni) ProQuest Central ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Korea Publicly Available Content Database ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database ProQuest Central ProQuest One Academic UKI Edition ProQuest Central Essentials ProQuest Central Korea ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Academic ProQuest Central China |
DatabaseTitleList | CrossRef Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals url: http://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Sciences (General) |
EISSN | 2076-3417 |
ExternalDocumentID | oai_doaj_org_article_c9520130e3684786b98c90bc951299da 10_3390_app122110812 |
GroupedDBID | .4S 2XV 5VS 7XC 8CJ 8FE 8FG 8FH AADQD AAFWJ AAYXX ABJCF ADBBV AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS APEBS ARAPS ARCSS ATCPS BBNVY BCNDV BENPR BHPHI BKSAR CCPQU CITATION CZ9 D1I D1J D1K GROUPED_DOAJ HCIFZ IAO ITC K6- K6V K7- KB. KC. KQ8 L6V LK5 LK8 M0K M7P M7R M7S MODMG M~E N95 OK1 P62 PATMY PCBAR PDBOC PIMPY PROAC PYCSY RIG TUS ABUWG AZQEC DWQXO PQEST PQQKQ PQUKI PRINS |
ID | FETCH-LOGICAL-c367t-72fd51c629f5d8a8f49f89e87ee88550f765321acab3f55e6e4e1b727e228b753 |
IEDL.DBID | DOA |
ISSN | 2076-3417 |
IngestDate | Tue Oct 22 15:15:13 EDT 2024 Sat Nov 09 14:10:07 EST 2024 Fri Nov 22 03:05:59 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 21 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c367t-72fd51c629f5d8a8f49f89e87ee88550f765321acab3f55e6e4e1b727e228b753 |
ORCID | 0000-0003-0379-6326 |
OpenAccessLink | https://doaj.org/article/c9520130e3684786b98c90bc951299da |
PQID | 2771655019 |
PQPubID | 2032433 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_c9520130e3684786b98c90bc951299da proquest_journals_2771655019 crossref_primary_10_3390_app122110812 |
PublicationCentury | 2000 |
PublicationDate | 2022-11-01 |
PublicationDateYYYYMMDD | 2022-11-01 |
PublicationDate_xml | – month: 11 year: 2022 text: 2022-11-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Applied sciences |
PublicationYear | 2022 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | Li (ref_10) 2020; 10 Zhao (ref_25) 2021; 9 ref_13 ref_12 ref_11 Guo (ref_23) 2020; 16 Xiong (ref_14) 2019; 97 Szabo (ref_30) 1996; 18 Zhang (ref_4) 2020; 53 Liu (ref_24) 2020; 7 Zhang (ref_15) 2019; 7 ref_19 Zhong (ref_7) 2018; 22 Lai (ref_20) 2013; 8 ref_16 Qin (ref_21) 2015; 10 Fan (ref_22) 2019; 99 Guo (ref_26) 2021; 8 Li (ref_8) 2018; 112 Zeng (ref_17) 2021; 8 Zhang (ref_18) 2022; 13 Li (ref_6) 2015; 27 Zhang (ref_9) 2020; 8 Li (ref_3) 2019; 9 Pang (ref_29) 2005; 167 ref_28 ref_27 Hao (ref_2) 2019; 153 ref_5 Xue (ref_1) 2019; 14 |
References_xml | – ident: ref_28 – volume: 9 start-page: 983 year: 2019 ident: ref_3 article-title: Extended file hierarchy access control scheme with attribute-based encryption in cloud computing publication-title: IEEE Trans. Emerg. Top. Comput. doi: 10.1109/TETC.2019.2904637 contributor: fullname: Li – volume: 153 start-page: 1 year: 2019 ident: ref_2 article-title: Fine-grained data access control with attribute-hiding policy for cloud-based IoT publication-title: Comput. Netw. doi: 10.1016/j.comnet.2019.02.008 contributor: fullname: Hao – ident: ref_5 – volume: 27 start-page: 1484 year: 2015 ident: ref_6 article-title: TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2015.2448095 contributor: fullname: Li – volume: 112 start-page: 89 year: 2018 ident: ref_8 article-title: Multi-authority fine-grained access control with accountability and its application in cloud publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2018.03.006 contributor: fullname: Li – volume: 22 start-page: 243 year: 2018 ident: ref_7 article-title: Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage publication-title: Soft Comput. doi: 10.1007/s00500-016-2330-8 contributor: fullname: Zhong – volume: 8 start-page: 8949 year: 2021 ident: ref_26 article-title: O 3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2021.3055541 contributor: fullname: Guo – volume: 7 start-page: 33202 year: 2019 ident: ref_15 article-title: Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2902040 contributor: fullname: Zhang – ident: ref_11 – volume: 53 start-page: 1 year: 2020 ident: ref_4 article-title: Attribute-based encryption for cloud computing access control: A survey publication-title: ACM Comput. Surv. (CSUR) contributor: fullname: Zhang – volume: 18 start-page: 28 year: 1996 ident: ref_30 article-title: Smart contracts: Building blocks for digital markets publication-title: EXTROPY J. Transhumanist Thought contributor: fullname: Szabo – volume: 97 start-page: 453 year: 2019 ident: ref_14 article-title: Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.03.008 contributor: fullname: Xiong – volume: 99 start-page: 134 year: 2019 ident: ref_22 article-title: Efficient and privacy preserving access control scheme for fog-enabled IoT publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.04.003 contributor: fullname: Fan – volume: 10 start-page: 1384 year: 2015 ident: ref_21 article-title: Attribute-based encryption with efficient verifiable outsourced decryption publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2410137 contributor: fullname: Qin – volume: 9 start-page: 13789 year: 2021 ident: ref_25 article-title: An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3052247 contributor: fullname: Zhao – ident: ref_27 – volume: 10 start-page: 762 year: 2020 ident: ref_10 article-title: Attribute based encryption with privacy protection and accountability for CloudIoT publication-title: IEEE Trans. Cloud Comput. doi: 10.1109/TCC.2020.2975184 contributor: fullname: Li – ident: ref_16 doi: 10.1109/NaNA51271.2020.00070 – volume: 8 start-page: 10963 year: 2021 ident: ref_17 article-title: Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2021.3051362 contributor: fullname: Zeng – volume: 167 start-page: 840 year: 2005 ident: ref_29 article-title: A new (t, n) multi-secret sharing scheme based on Shamir’s secret sharing publication-title: Appl. Math. Comput. contributor: fullname: Pang – volume: 13 start-page: 613 year: 2022 ident: ref_18 article-title: PHAS-HEKR-CP-ABE: Partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system publication-title: J. Ambient Intell. Humaniz. Comput. doi: 10.1007/s12652-021-02922-6 contributor: fullname: Zhang – volume: 14 start-page: 2927 year: 2019 ident: ref_1 article-title: An attribute-based controlled collaborative access control scheme for public cloud storage publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2019.2911166 contributor: fullname: Xue – volume: 16 start-page: 1550147720906796 year: 2020 ident: ref_23 article-title: A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing publication-title: Int. J. Distrib. Sens. Netw. doi: 10.1177/1550147720906796 contributor: fullname: Guo – ident: ref_13 – volume: 8 start-page: 1343 year: 2013 ident: ref_20 article-title: Attribute-based encryption with verifiable outsourced decryption publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2013.2271848 contributor: fullname: Lai – ident: ref_19 – volume: 8 start-page: 23294 year: 2020 ident: ref_9 article-title: Privacy-preserving multi-authority attribute-based data sharing framework for smart grid publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2970272 contributor: fullname: Zhang – volume: 7 start-page: 7851 year: 2020 ident: ref_24 article-title: BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.2993231 contributor: fullname: Liu – ident: ref_12 doi: 10.1145/2484313.2484381 |
SSID | ssj0000913810 |
Score | 2.3445845 |
Snippet | The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the... |
SourceID | doaj proquest crossref |
SourceType | Open Website Aggregation Database |
StartPage | 10812 |
SubjectTerms | Access control Blockchain Cloud computing Communication Data encryption Design Distributed ledger Electronic health records Electronic medical records Health care Health services Information sharing IOMT medical data sharing multi-authority attribute encryption outsourced decryption Outsourcing Patients policy hiding Prediction models Privacy Security Servers Stochasticity Technology Third party |
Title | Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme |
URI | https://www.proquest.com/docview/2771655019 https://doaj.org/article/c9520130e3684786b98c90bc951299da |
Volume | 12 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELagEwyIFhCFgjyABENE7SR-jC2k6gIDBYmJKH5ESIgU9THw7zk_WhUxsLBajpLcxffdF5-_Q-giB87Fc6YTxfsmyXStE0EtcB5JFOArXCbceefxhD-8iLvCyeSsW325mrAgDxwMd6NlTt3umk0ZBFLBlBRa9hUMA1JJE1KjPtsgUz4GS-Kkq0Klewq83u0HE-rYjiD0BwZ5qf5fkdjDy2gf7cW8EA_C87TRlm06aHdDLbCD2nEdzvFVFIu-PkCvQ0Cjd_0GBD8ZAiIZfB9LBLH7-zWdecVUPFiEzlY2TioaPfvy0QJD1oqL8SMe-NaJ-DbUruMJePPDHqLnUfF0O05iz4REp4wvEk5rkxPNqKxzIypRZ7IW0gpurXDaZTVneUpJpSuV1nlumc0sUZDEWEqFAu5yhFrNtLHHCItMplnFKicSltVpJSrjxGMsk8oQnZEuulxZsfwM0hglUApn7XLT2l00dCZez3GC1n4A3FxGN5d_ubmLeisHlXGVzUvKge3BSxF58h_3OEU71B1u8CcNe6i1mC3tGdqem-W5_7q-ATpk0N0 |
link.rule.ids | 315,782,786,866,2106,27933,27934 |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Blockchain-Based+Multiple+Authorities+Attribute-Based+Encryption+for+EHR+Access+Control+Scheme&rft.jtitle=Applied+sciences&rft.au=Yang%2C+Xiaohui&rft.au=Zhang%2C+Chenshuo&rft.date=2022-11-01&rft.pub=MDPI+AG&rft.eissn=2076-3417&rft.volume=12&rft.issue=21&rft.spage=10812&rft_id=info:doi/10.3390%2Fapp122110812&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon |