Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme
نویسندگان
چکیده
The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development digital healthcare systems by connecting available medical resources services. However, there concerns about security sharing patients’ health records. In response to prevailing problems such as difficulties records between different hospitals inability grasp usage their records, we propose a patient-controlled cloud-chain collaborative multi-authority attribute-based encryption for EHR with verifiable outsourcing decryption hiding access policies (VO-PH-MAABE). This scheme uses blockchain store validation parameters utilizing its immutable, which data users use verify correctness third-party results. addition, policy-hiding technology protect privacy so that guaranteed. Moreover, establish trust among multiple authorities utilize Shamir secret smart contracts compute keys or tokens attributes managed across administrative domains, avoids single point failure reduces communication computation overhead on user side. Finally, ciphertext indistinguishability under chosen plaintext attack demonstrated stochastic prediction model compared other schemes terms functionality, overhead, overhead. experimental results show effectiveness this scheme.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملNotes on "An Effective ECC based User Access Control Scheme with Attribute based Encryption for WSN"
The rapid growth of networking and communication technologies results in amalgamation of 'Internet of Things' and 'Wireless sensor networks' to form WSNIT. WSNIT facilitates the WSN to connect dynamically to Internet and exchange the data with the external world. The critical data stored in sensor nodes related to patient health, environment can be accessed by attackers via insecure internet. T...
متن کاملBlockchain Based Access Control
Access Control systems are used in computer security to regulate the access to critical or valuable resources. The rights of subjects to access such resources are typically expressed through access control policies, which are evaluated at access request time against the current access context. This paper proposes a new approach based on blockchain technology to publish the policies expressing t...
متن کاملA2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control
As a recently proposed public key primitive, attribute-based encryption (ABE) (including Ciphertext-policy ABE (CP-ABE) and Key-policy ABE (KP-ABE)) is a highly promising tool for secure fine-grained access control. For the purpose of secure access control, there is, however, still one critical functionality missing in the existing ABE schemes, which is the prevention of key abuse. In particula...
متن کاملOblivious Transfer with Hidden Access Control from Attribute-Based Encryption
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed by Camenisch et al. (Public-Key Cryptography 2011). This primitive allows a user to anonymously query a database where each record is protected by a hidden attribute-based access control policy. At each query, the user either learns the value of a single record if the attributes in his key satisfy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2022
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app122110812