skip to main content
10.1007/978-3-030-30952-7_36guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Adaptive Authorization Access Method for Medical Cloud Data Based on Attribute Encryption

Published: 20 September 2019 Publication History

Abstract

The outsourcing storage of medical big data encrypted in the cloud can effectively alleviate the problem of privacy disclosure, but cipher text storage will lead to the inconvenience of data access, which brings new challenges to medical big data shared access. The existing flexible authorization solutions for encrypted data are mainly based on methods such as CP-ABE, which requires the data owner to define the data access strategy, while in reality, the patient is the data owner of the medical data. At the same time, the existing scheme does not support access control authorization in emergency scenarios, and in medical big data applications, when patients can not authorize data users to access cipher text medical data, it will lead to unpredictable consequences. According to the application requirements of encrypted medical big data shared service in cloud environment, an adaptive authorization access method based on attribute encryption is proposed to realize flexible and secure medical data access authorization in normal and emergency situations. Experimental results demonstrate that our scheme is efficient.

References

[1]
Song W, Wang B, Wang Q, Peng Z, and Lou W Tell me the truth: practically public authentication for outsourced databases with multi-user modification Inf. Sci. 2017 387 221-237
[2]
Sahai A and Waters B Cramer R Fuzzy identity-based encryption Advances in Cryptology – EUROCRYPT 2005 2005 Heidelberg Springer 457-473
[3]
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of CCS, pp. 89–98 (2006)
[4]
Brucker, A.D., Petritsch, H.: Extending access control models with break-glass. In: Proceedings of SACMAT, pp. 197–206 (2009)
[5]
Wang X, Hu Q, Zhang Y, Zhang G, Juan W, and Xing C Meng X, Li R, Wang K, Niu B, Wang X, and Zhao G A kind of decision model research based on big data and blockchain in eHealth Web Information Systems and Applications 2018 Cham Springer 300-306
[6]
Ajtai, M.: Generating hard instances of lattice problems. In: Proceedings of ACM Symposium on Theory of Computing, pp. 99–108 (1996)
[7]
Wang, B., Song, W., Lou, W., Thomas Hou, Y.: Privacy-preserving pattern matching over encrypted genetic data in cloud computing. In: Proceedings of INFOCOM, pp. 1–9 (2017)
[8]
Yang Y, Zheng X, Guo W, Liu X, and Chang V Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system Inf. Sci. 2019 479 567-592
[9]
Hui C, Deng RH, Li Y, and Guowei W Attribute-based storage supporting secure deduplication of encrypted data in cloud IEEE Trans. Big Data 2017 99 1
[10]
Han J, Susilo W, Yi M, Zhou J, and Man Ho Allen A Improving privacy and security in decentralized ciphertext-policy attribute-based encryption IEEE Trans. Inf. Forensics Secur. 2015 10 3 665-678

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
Web Information Systems and Applications: 16th International Conference, WISA 2019, Qingdao, China, September 20-22, 2019, Proceedings
Sep 2019
724 pages
ISBN:978-3-030-30951-0
DOI:10.1007/978-3-030-30952-7
  • Editors:
  • Weiwei Ni,
  • Xin Wang,
  • Wei Song,
  • Yukun Li

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 20 September 2019

Author Tags

  1. Attribute encryption
  2. Adaptive access control
  3. Privacy protection
  4. Medical big data

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media