Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme

The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development of digital healthcare systems by connecting available medical resources and healthcare services. However, there are concerns about the...

Full description

Saved in:
Bibliographic Details
Published in:Applied sciences Vol. 12; no. 21; p. 10812
Main Authors: Yang, Xiaohui, Zhang, Chenshuo
Format: Journal Article
Language:English
Published: Basel MDPI AG 01-11-2022
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development of digital healthcare systems by connecting available medical resources and healthcare services. However, there are concerns about the security of sharing patients’ electronic health records. In response to the prevailing problems such as difficulties in sharing medical records between different hospitals and patients’ inability to grasp the usage of their medical records, we propose a patient-controlled and cloud-chain collaborative multi-authority attribute-based encryption for EHR sharing with verifiable outsourcing decryption and hiding access policies (VO-PH-MAABE). This scheme uses blockchain to store the validation parameters by utilizing its immutable, which data users use to verify the correctness of third-party outsourcing decryption results. In addition, we use policy-hiding technology to protect data privacy so that data security is guaranteed. Moreover, we use blockchain technology to establish trust among multiple authorities and utilize Shamir secret sharing and smart contracts to compute keys or tokens for attributes managed across multiple administrative domains, which avoids a single point of failure and reduces communication and computation overhead on the data user side. Finally, the ciphertext indistinguishability security under the chosen plaintext attack is demonstrated under the stochastic prediction model and compared with other schemes in terms of functionality, communication overhead, and computation overhead. The experimental results show the effectiveness of this scheme.
AbstractList The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development of digital healthcare systems by connecting available medical resources and healthcare services. However, there are concerns about the security of sharing patients’ electronic health records. In response to the prevailing problems such as difficulties in sharing medical records between different hospitals and patients’ inability to grasp the usage of their medical records, we propose a patient-controlled and cloud-chain collaborative multi-authority attribute-based encryption for EHR sharing with verifiable outsourcing decryption and hiding access policies (VO-PH-MAABE). This scheme uses blockchain to store the validation parameters by utilizing its immutable, which data users use to verify the correctness of third-party outsourcing decryption results. In addition, we use policy-hiding technology to protect data privacy so that data security is guaranteed. Moreover, we use blockchain technology to establish trust among multiple authorities and utilize Shamir secret sharing and smart contracts to compute keys or tokens for attributes managed across multiple administrative domains, which avoids a single point of failure and reduces communication and computation overhead on the data user side. Finally, the ciphertext indistinguishability security under the chosen plaintext attack is demonstrated under the stochastic prediction model and compared with other schemes in terms of functionality, communication overhead, and computation overhead. The experimental results show the effectiveness of this scheme.
Author Zhang, Chenshuo
Yang, Xiaohui
Author_xml – sequence: 1
  givenname: Xiaohui
  orcidid: 0000-0003-0379-6326
  surname: Yang
  fullname: Yang, Xiaohui
– sequence: 2
  givenname: Chenshuo
  surname: Zhang
  fullname: Zhang, Chenshuo
BookMark eNpNkUtLAzEUhYMoWB87f8CAW0fzaCbJsi31ARXBx9aQydzY1OlkTDIL_72jFfFu7uXwce6Bc4T2u9ABQmcEXzKm8JXpe0IpIVgSuocmFIuqZFMi9v_dh-g0pQ0eRxEmCZ6g13kb7LtdG9-Vc5OgKe6HNvu-hWI25HWIPntIxSzn6Oshwy-07Gz87LMPXeFCLJa3j8XMWkipWIQux9AWT3YNWzhBB860CU5_9zF6uV4-L27L1cPN3WK2Ki2rRC4FdQ0ntqLK8UYa6abKSQVSAEjJOXai4owSY03NHOdQwRRILagASmUtODtGdzvfJpiN7qPfmvipg_H6RwjxTZuYvW1BW8UpJgwDq-RUyKpW0ipcjzKhSjVm9DrfefUxfAyQst6EIXZjfE2FINWYh6iRuthRNoaUIri_rwTr70L0_0LYF-cuffA
CitedBy_id crossref_primary_10_1080_09540091_2023_2174081
crossref_primary_10_1002_cpe_8122
crossref_primary_10_1007_s11042_023_15846_4
Cites_doi 10.1109/TETC.2019.2904637
10.1016/j.comnet.2019.02.008
10.1109/TPDS.2015.2448095
10.1016/j.jnca.2018.03.006
10.1007/s00500-016-2330-8
10.1109/JIOT.2021.3055541
10.1109/ACCESS.2019.2902040
10.1016/j.future.2019.03.008
10.1016/j.future.2019.04.003
10.1109/TIFS.2015.2410137
10.1109/ACCESS.2021.3052247
10.1109/TCC.2020.2975184
10.1109/NaNA51271.2020.00070
10.1109/JIOT.2021.3051362
10.1007/s12652-021-02922-6
10.1109/TIFS.2019.2911166
10.1177/1550147720906796
10.1109/TIFS.2013.2271848
10.1109/ACCESS.2020.2970272
10.1109/JIOT.2020.2993231
10.1145/2484313.2484381
ContentType Journal Article
Copyright 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
PIMPY
PQEST
PQQKQ
PQUKI
PRINS
DOA
DOI 10.3390/app122110812
DatabaseName CrossRef
ProQuest Central (Alumni)
ProQuest Central
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central Korea
Publicly Available Content Database
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest Central
ProQuest One Academic UKI Edition
ProQuest Central Essentials
ProQuest Central Korea
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Academic
ProQuest Central China
DatabaseTitleList
CrossRef
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals
  url: http://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 2076-3417
ExternalDocumentID oai_doaj_org_article_c9520130e3684786b98c90bc951299da
10_3390_app122110812
GroupedDBID .4S
2XV
5VS
7XC
8CJ
8FE
8FG
8FH
AADQD
AAFWJ
AAYXX
ABJCF
ADBBV
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
APEBS
ARAPS
ARCSS
ATCPS
BBNVY
BCNDV
BENPR
BHPHI
BKSAR
CCPQU
CITATION
CZ9
D1I
D1J
D1K
GROUPED_DOAJ
HCIFZ
IAO
ITC
K6-
K6V
K7-
KB.
KC.
KQ8
L6V
LK5
LK8
M0K
M7P
M7R
M7S
MODMG
M~E
N95
OK1
P62
PATMY
PCBAR
PDBOC
PIMPY
PROAC
PYCSY
RIG
TUS
ABUWG
AZQEC
DWQXO
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c367t-72fd51c629f5d8a8f49f89e87ee88550f765321acab3f55e6e4e1b727e228b753
IEDL.DBID DOA
ISSN 2076-3417
IngestDate Tue Oct 22 15:15:13 EDT 2024
Sat Nov 09 14:10:07 EST 2024
Fri Nov 22 03:05:59 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 21
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c367t-72fd51c629f5d8a8f49f89e87ee88550f765321acab3f55e6e4e1b727e228b753
ORCID 0000-0003-0379-6326
OpenAccessLink https://doaj.org/article/c9520130e3684786b98c90bc951299da
PQID 2771655019
PQPubID 2032433
ParticipantIDs doaj_primary_oai_doaj_org_article_c9520130e3684786b98c90bc951299da
proquest_journals_2771655019
crossref_primary_10_3390_app122110812
PublicationCentury 2000
PublicationDate 2022-11-01
PublicationDateYYYYMMDD 2022-11-01
PublicationDate_xml – month: 11
  year: 2022
  text: 2022-11-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Applied sciences
PublicationYear 2022
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Li (ref_10) 2020; 10
Zhao (ref_25) 2021; 9
ref_13
ref_12
ref_11
Guo (ref_23) 2020; 16
Xiong (ref_14) 2019; 97
Szabo (ref_30) 1996; 18
Zhang (ref_4) 2020; 53
Liu (ref_24) 2020; 7
Zhang (ref_15) 2019; 7
ref_19
Zhong (ref_7) 2018; 22
Lai (ref_20) 2013; 8
ref_16
Qin (ref_21) 2015; 10
Fan (ref_22) 2019; 99
Guo (ref_26) 2021; 8
Li (ref_8) 2018; 112
Zeng (ref_17) 2021; 8
Zhang (ref_18) 2022; 13
Li (ref_6) 2015; 27
Zhang (ref_9) 2020; 8
Li (ref_3) 2019; 9
Pang (ref_29) 2005; 167
ref_28
ref_27
Hao (ref_2) 2019; 153
ref_5
Xue (ref_1) 2019; 14
References_xml – ident: ref_28
– volume: 9
  start-page: 983
  year: 2019
  ident: ref_3
  article-title: Extended file hierarchy access control scheme with attribute-based encryption in cloud computing
  publication-title: IEEE Trans. Emerg. Top. Comput.
  doi: 10.1109/TETC.2019.2904637
  contributor:
    fullname: Li
– volume: 153
  start-page: 1
  year: 2019
  ident: ref_2
  article-title: Fine-grained data access control with attribute-hiding policy for cloud-based IoT
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2019.02.008
  contributor:
    fullname: Hao
– ident: ref_5
– volume: 27
  start-page: 1484
  year: 2015
  ident: ref_6
  article-title: TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2015.2448095
  contributor:
    fullname: Li
– volume: 112
  start-page: 89
  year: 2018
  ident: ref_8
  article-title: Multi-authority fine-grained access control with accountability and its application in cloud
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2018.03.006
  contributor:
    fullname: Li
– volume: 22
  start-page: 243
  year: 2018
  ident: ref_7
  article-title: Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
  publication-title: Soft Comput.
  doi: 10.1007/s00500-016-2330-8
  contributor:
    fullname: Zhong
– volume: 8
  start-page: 8949
  year: 2021
  ident: ref_26
  article-title: O 3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2021.3055541
  contributor:
    fullname: Guo
– volume: 7
  start-page: 33202
  year: 2019
  ident: ref_15
  article-title: Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2902040
  contributor:
    fullname: Zhang
– ident: ref_11
– volume: 53
  start-page: 1
  year: 2020
  ident: ref_4
  article-title: Attribute-based encryption for cloud computing access control: A survey
  publication-title: ACM Comput. Surv. (CSUR)
  contributor:
    fullname: Zhang
– volume: 18
  start-page: 28
  year: 1996
  ident: ref_30
  article-title: Smart contracts: Building blocks for digital markets
  publication-title: EXTROPY J. Transhumanist Thought
  contributor:
    fullname: Szabo
– volume: 97
  start-page: 453
  year: 2019
  ident: ref_14
  article-title: Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.03.008
  contributor:
    fullname: Xiong
– volume: 99
  start-page: 134
  year: 2019
  ident: ref_22
  article-title: Efficient and privacy preserving access control scheme for fog-enabled IoT
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.04.003
  contributor:
    fullname: Fan
– volume: 10
  start-page: 1384
  year: 2015
  ident: ref_21
  article-title: Attribute-based encryption with efficient verifiable outsourced decryption
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2410137
  contributor:
    fullname: Qin
– volume: 9
  start-page: 13789
  year: 2021
  ident: ref_25
  article-title: An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3052247
  contributor:
    fullname: Zhao
– ident: ref_27
– volume: 10
  start-page: 762
  year: 2020
  ident: ref_10
  article-title: Attribute based encryption with privacy protection and accountability for CloudIoT
  publication-title: IEEE Trans. Cloud Comput.
  doi: 10.1109/TCC.2020.2975184
  contributor:
    fullname: Li
– ident: ref_16
  doi: 10.1109/NaNA51271.2020.00070
– volume: 8
  start-page: 10963
  year: 2021
  ident: ref_17
  article-title: Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2021.3051362
  contributor:
    fullname: Zeng
– volume: 167
  start-page: 840
  year: 2005
  ident: ref_29
  article-title: A new (t, n) multi-secret sharing scheme based on Shamir’s secret sharing
  publication-title: Appl. Math. Comput.
  contributor:
    fullname: Pang
– volume: 13
  start-page: 613
  year: 2022
  ident: ref_18
  article-title: PHAS-HEKR-CP-ABE: Partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system
  publication-title: J. Ambient Intell. Humaniz. Comput.
  doi: 10.1007/s12652-021-02922-6
  contributor:
    fullname: Zhang
– volume: 14
  start-page: 2927
  year: 2019
  ident: ref_1
  article-title: An attribute-based controlled collaborative access control scheme for public cloud storage
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2019.2911166
  contributor:
    fullname: Xue
– volume: 16
  start-page: 1550147720906796
  year: 2020
  ident: ref_23
  article-title: A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing
  publication-title: Int. J. Distrib. Sens. Netw.
  doi: 10.1177/1550147720906796
  contributor:
    fullname: Guo
– ident: ref_13
– volume: 8
  start-page: 1343
  year: 2013
  ident: ref_20
  article-title: Attribute-based encryption with verifiable outsourced decryption
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2013.2271848
  contributor:
    fullname: Lai
– ident: ref_19
– volume: 8
  start-page: 23294
  year: 2020
  ident: ref_9
  article-title: Privacy-preserving multi-authority attribute-based data sharing framework for smart grid
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2970272
  contributor:
    fullname: Zhang
– volume: 7
  start-page: 7851
  year: 2020
  ident: ref_24
  article-title: BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.2993231
  contributor:
    fullname: Liu
– ident: ref_12
  doi: 10.1145/2484313.2484381
SSID ssj0000913810
Score 2.3445845
Snippet The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the...
SourceID doaj
proquest
crossref
SourceType Open Website
Aggregation Database
StartPage 10812
SubjectTerms Access control
Blockchain
Cloud computing
Communication
Data encryption
Design
Distributed ledger
Electronic health records
Electronic medical records
Health care
Health services
Information sharing
IOMT
medical data sharing
multi-authority attribute encryption
outsourced decryption
Outsourcing
Patients
policy hiding
Prediction models
Privacy
Security
Servers
Stochasticity
Technology
Third party
Title Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme
URI https://www.proquest.com/docview/2771655019
https://doaj.org/article/c9520130e3684786b98c90bc951299da
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELagEwyIFhCFgjyABENE7SR-jC2k6gIDBYmJKH5ESIgU9THw7zk_WhUxsLBajpLcxffdF5-_Q-giB87Fc6YTxfsmyXStE0EtcB5JFOArXCbceefxhD-8iLvCyeSsW325mrAgDxwMd6NlTt3umk0ZBFLBlBRa9hUMA1JJE1KjPtsgUz4GS-Kkq0Klewq83u0HE-rYjiD0BwZ5qf5fkdjDy2gf7cW8EA_C87TRlm06aHdDLbCD2nEdzvFVFIu-PkCvQ0Cjd_0GBD8ZAiIZfB9LBLH7-zWdecVUPFiEzlY2TioaPfvy0QJD1oqL8SMe-NaJ-DbUruMJePPDHqLnUfF0O05iz4REp4wvEk5rkxPNqKxzIypRZ7IW0gpurXDaZTVneUpJpSuV1nlumc0sUZDEWEqFAu5yhFrNtLHHCItMplnFKicSltVpJSrjxGMsk8oQnZEuulxZsfwM0hglUApn7XLT2l00dCZez3GC1n4A3FxGN5d_ubmLeisHlXGVzUvKge3BSxF58h_3OEU71B1u8CcNe6i1mC3tGdqem-W5_7q-ATpk0N0
link.rule.ids 315,782,786,866,2106,27933,27934
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Blockchain-Based+Multiple+Authorities+Attribute-Based+Encryption+for+EHR+Access+Control+Scheme&rft.jtitle=Applied+sciences&rft.au=Yang%2C+Xiaohui&rft.au=Zhang%2C+Chenshuo&rft.date=2022-11-01&rft.pub=MDPI+AG&rft.eissn=2076-3417&rft.volume=12&rft.issue=21&rft.spage=10812&rft_id=info:doi/10.3390%2Fapp122110812&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon