Abstract

Fog computing can extend cloud computing to the edge of the network so as to reduce latency and network congestion. However, existing encryption schemes were rarely used in fog environment, resulting in high computational and storage overhead. Aiming at the demands of local information for terminal device and the shortcomings of cloud computing framework in supporting mobile applications, by taking the hospital scene as an example, a searchable personal health records framework with fine-grained access control in cloud-fog computing is proposed. The proposed framework combines the attribute-based encryption (ABE) technology and search encryption (SE) technology to implement keyword search function and fine-grained access control ability. When keyword index and trapdoor match are successful, the cloud server provider only returns relevant search results to the user, thus achieving a more accurate search. At the same time, the scheme is multi-authority, and the key leakage problem is solved by dividing the user secret key distribution task. Moreover, in the proposed scheme, we securely outsource part of the encryption and decryption operations to the fog node. It is effective both in local resources and in resource-constrained mobile devices. Based on the decisional q-parallel bilinear Diffie-Hellman exponent (q-DBDHE) assumption and decisional bilinear Diffie-Hellman (DBDH) assumption, our scheme is proven to be secure. Simulation experiments show that our scheme is efficient in the cloud-fog environment.

Highlights

  • With the promotion of new medical reform policies and the rapid development of medical information, Electronic Medical Record (EMR) [1] has become an inevitable outcome of network information technology in the medical field

  • The fog node bridges between the intelligent terminal and the cloud, the data owner and data user can be directly connected to fog nodes, and each fog node is connected to the cloud, reducing unnecessary data transmission

  • This section mainly gives the basic concept of access structure; introduces bilinear maps and uses it as the main mathematical tool to construct the encryption algorithm proposed in this paper; the definition of the linear secret sharing scheme is given; and some difficult problems are introduced to prove the security of this scheme

Read more

Summary

Introduction

With the promotion of new medical reform policies and the rapid development of medical information, Electronic Medical Record (EMR) [1] has become an inevitable outcome of network information technology in the medical field. A searchable PHR framework with fine-grained access control in cloud-fog computing. In 2010, Ibraimi et al [7] applied ABE to PHR security management to achieve flexible access control. In 2013, Li et al [8] used attribute-based encryption technology to encrypt PHR files of patients, achieving scalability and fine-grained access control for PHR. Unlike other solutions, this scheme supports multiple data owner application scenarios. Compared to the traditional single-authority CP-ABE schemes, the attributes come from different attribute authorities in the multi-authority CP-ABE schemes It does not cause single point of failure and key leakage, which makes the multi-authority CP-ABE schemes more practical in cloud-fog computing. In addition to data security issues, supporting outsourced partial computing operations and efficient searching of encrypted data are an important feature in practical applications

Related work
Our contribution
Organization
Preliminaries
Bilinear maps
Hardness assumptions
Algorithm definition
Key Generation
File Encryption
Search over Ciphertext
File Decryption
Definition of security model
Algorithm construction
Detailed description of our scheme
Correctness analysis
Security analysis
Performance analysis
Experimental analysis
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.