Searchable encryption system with traitor tracing function in mobile electronic healthcare

A mobile electronics and electronic medical technology, applied in the transmission system, digital transmission system, electrical components, etc., can solve the problems that are not suitable for large-scale electronic medical systems, cannot be used according to needs, and cannot support traitor tracking.

Active Publication Date: 2017-08-29
FUZHOU UNIV
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantages of the existing traitor tracking schemes are: it is necessary to establish and maintain a user list to realize the traitor tracking function; or it will generate a lot of extra computing overhead for the system
Other searchable encryption schemes require the system to re-encrypt all encrypted files and update all legitimate keys, thereby revoking the user's
Obviously, this approach is not suitable for large electronic medical systems
In addition, the computational overhead of these schemes increases with the complexity of the access structure, and a large amount of computational overhead is not suitable for mobile devices with limited power in mHealth networks
[0007] In view of the problems that the existing system has too much computing and storage overhead, cannot support traitor tracking, and cannot perform user revocation as required, this invention proposes a new type of lightweight, which can share data and access rights, and can perform traitor tracking. Tracking Secure Electronic Medical System (LiST)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable encryption system with traitor tracing function in mobile electronic healthcare
  • Searchable encryption system with traitor tracing function in mobile electronic healthcare
  • Searchable encryption system with traitor tracing function in mobile electronic healthcare

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The technical solution of the present invention will be specifically described below in conjunction with the accompanying drawings.

[0026] The present invention is a searchable encryption system with traitor tracking function in mobile electronic medical treatment, figure 1 The system framework in this embodiment mainly consists of four entities: wireless body sensor network (WBSN) as data owner, medical staff as data user, public cloud and key generation center (KGC).

[0027] (1) When the electronic medical data (EHR) is generated in the wireless body area sensor network, the data owner will extract keywords to describe the EHR. Then, the EHR and keywords are encrypted using a lightweight encryption algorithm. During the encryption process, the access policy specified by the data owner will be embedded in the encrypted EHR. The ciphertext is then outsourced to a public cloud via a wireless local area network (WLAN).

[0028] (2) When authorized medical personnel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a searchable encryption system with a traitor tracing function in mobile electronic healthcare. In view of the problems that the computation overhead in the existing mobile health (mHealth) system is too large, traitor tracing cannot be supported, and that on-demand revocation of users cannot be realized, a novel lightweight secure electronic health system (LiST) is provided, which can perform data sharing, access authority control and traitor tracing. In addition to realizing fine-grained access control of encrypted electronic heath records (EHR) by using an attribute-based encryption (ABE) mechanism, the LiST also supports keyword search of the encrypted HER, and provides an efficient traitor tracing mechanism and a flexible user revocation mechanism.

Description

technical field [0001] The invention relates to a searchable encryption system with traitor tracking function in mobile electronic medical treatment. Background technique [0002] The mobile electronic medical (mHealth) system includes various mobile devices, and uses wireless communication technology to communicate between devices, which can be used to collect clinical medical data and provide it to medical service institutions. The emergence of wireless body sensor networks (WBSN) has accelerated the development of mobile electronic medical networks, placing implantable or wearable medical sensors on patients to monitor physiological data. These medical data are aggregated into mobile devices and sent to the cloud via wireless networks. However, mobile devices often have very limited computing, storage capabilities, and limited power supplies. In addition to the performance issues of mobile devices, data security and privacy issues are also major obstacles preventing the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L29/08G06F19/00
CPCG16H10/60H04L9/0861H04L63/0428H04L63/062H04L63/123H04L67/12
Inventor 杨旸李光滟刘西蒙钟尚平李应董晨邹剑
Owner FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products