Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud
Publication Type
Journal Article
Publication Date
5-2024
Abstract
Electronic health (e-health) systems may outsource data such as patient e-health records to mobile cloud servers for efficiency gains (e.g., minimizing local storage and computation costs). However, such a move may result in privacy implications in the presence of semi-honest cloud servers. Searchable Encryption (SE) can potentially facilitate privacy-preserving searches based on keywords for encrypted data stored in the mobile cloud, but most existing SE solutions do not support temporal access control (i.e., a mechanism that grants access permissions to users for specified time ranges). Hence, in this paper we design a time-controllable keyword search scheme by using an attribute-based comparable access control. This allows users to match indexes encrypted at specified time intervals. Then, we improve the basic framework to support efficient user revocation using secret sharing. We then formally prove the security of our proposed frameworks against chosen-keyword attack and key collusion attack, as well as achieving keyword secrecy. We also evaluate the performance of our proposed approach using a real-world dataset to demonstrate their practical utility.
Keywords
Chosen-keyword attack, comparable access control, e-health system, searchable encryption, user revocation
Discipline
Databases and Information Systems | Health Information Technology
Research Areas
Information Systems and Management
Publication
IEEE Transactions on Mobile Computing
Volume
23
Issue
5
First Page
3650
Last Page
3665
ISSN
1536-1233
Identifier
10.1109/TMC.2023.3277702
Publisher
Institute of Electrical and Electronics Engineers
Citation
MIAO, Yinbin; LI, Feng; LI, Xinghua; LIU, Zhiquan; NING, Jianting; LI, Hongwei; CHOO, Kim-Kwang Raymond; and DENG, Robert H..
Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud. (2024). IEEE Transactions on Mobile Computing. 23, (5), 3650-3665.
Available at: https://ink.library.smu.edu.sg/sis_research/8753
Additional URL
https://doi.org/10.1109/TMC.2023.3277702