浏览全部资源
扫码关注微信
1.南开大学网络空间安全学院,天津 300350
2.天津市网络与数据安全技术重点实验室,天津 300350
[ "张晓旭(1998- ),女,天津人,南开大学博士生,主要研究方向为云数据完整性检测、云数据隐私保护、密码学应用。" ]
[ "陈宇辰(2000- ),男,福建永春人,南开大学硕士生,主要研究方向为密码学应用、加密数据去重。" ]
[ "哈冠雄(1995- ),男,回族,天津人,南开大学博士生,主要研究方向为云数据安全、密码学应用、加密数据去重。" ]
[ "贾春福(1967- ),男,河北文安人,博士,南开大学教授、博士生导师,主要研究方向为网络与信息安全、可信计算、恶意代码分析、密码学及应用等。" ]
收稿日期:2024-06-18,
修回日期:2024-09-09,
纸质出版日期:2024-09-25
移动端阅览
张晓旭,陈宇辰,哈冠雄等.基于分布式存储的外包EHR隐私保护分类审计方案[J].通信学报,2024,45(09):26-39.
ZHANG Xiaoxu,CHEN Yuchen,HA Guanxiong,et al.Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage[J].Journal on Communications,2024,45(09):26-39.
张晓旭,陈宇辰,哈冠雄等.基于分布式存储的外包EHR隐私保护分类审计方案[J].通信学报,2024,45(09):26-39. DOI: 10.11959/j.issn.1000-436x.2024169.
ZHANG Xiaoxu,CHEN Yuchen,HA Guanxiong,et al.Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage[J].Journal on Communications,2024,45(09):26-39. DOI: 10.11959/j.issn.1000-436x.2024169.
随着电子医疗领域的发展,电子健康记录(EHR)常被外包到雾节点上进行分布式存储以提升可靠性。EHR中包含大量隐私信息,然而数据外包易造成安全隐患,可能破坏EHR的完整性与隐私性。为确保EHR的安全存储,提出一种高效的基于EHR分类的分布式数据完整性审计方案。该方案将分类标签与布隆过滤器相结合以提升审计效率,利用Shamir秘密共享完成分布式审计,采用属性基可搜索加密以保护EHR所属类别信息的隐私。实验结果表明,所提方案的通信开销和计算开销较低。
With the development of the electronic medical field
Electronic health record (EHR) are often outsourced to fog nodes for distributed storage to enhance reliability. EHR contains a large amount of private information
however
data outsourcing can create security risks
potentially compromising the integrity and privacy of EHR. In order to ensure the secure storage of EHR
an efficient distributed data integrity auditing scheme based on EHR classification was proposed. The scheme combined classification labels with Bloom filters to enhance auditing efficiency
Shamir’s secret sharing was used for distributed auditing
and attribute-based searchable encryption was employed to protect the privacy of EHR’ category information. Experimental results show that the proposed scheme has low communication and computation costs.
HU Y , CHENG L , YAO Q , et al . Exploiting combined locality for wide-stripe erasure coding in distributed storage [C ] // 19th USENIX Conference on File and Storage Technologies (FAST 21) . Berkeley : USENIX Association , 2021 : 233 - 248 .
LI J , NELSON J , MICHAEL E , et al . Pegasus: tolerating skewed workloads in distributed storage with in-network coherence directories [C ] // 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20) . Berkeley : USENIX Association , 2020 : 387 - 406 .
SHICKEL B , TIGHE P J , BIHORAC A , et al . Deep EHR: a survey of recent advances in deep learning techniques for electronic health record (EHR) analysis [J ] . IEEE Journal of Biomedical and Health Informatics , 2017 , 22 ( 5 ): 1589 - 1604 .
DAGLIATI A , MALOVINI A , TIBOLLO V , et al . Health informatics and EHR to support clinical research in the COVID-19 pandemic: an overview [J ] . Briefings in Bioinformatics , 2021 , 22 ( 2 ): 812 - 822 .
GAO H , HUANG H , XUE L , et al . Blockchain-enabled fine-grained searchable encryption with cloud-edge computing for electronic health records sharing [J ] . IEEE Internet of Things Journal , 2023 , 10 ( 20 ): 18414 - 18425 .
XU S , NING J , HUANG X , et al . Untouchable once revoking: a practical and secure dynamic EHR sharing system via cloud [J ] . IEEE Transactions on Dependable and Secure Computing , 2021 , 19 ( 6 ): 3759 - 3773 .
KIMOVSKI D , MEHRAN N , KERTH C E , et al . Mobility-aware IoT applications placement in the cloud edge continuum [J ] . IEEE Transactions on Services Computing , 2021 , 15 ( 6 ): 3358 - 3371 .
SU Y , LI Y , ZHANG K , et al . A privacy-preserving public integrity check scheme for outsourced EHR [J ] . Information Sciences , 2021 , 542 : 112 - 130 .
张佳乐 , 赵彦超 , 陈兵 , 等 . 边缘计算数据安全与隐私保护研究综述 [J ] . 通信学报 , 2018 , 39 ( 3 ): 1 - 21 .
ZHANG J L , ZHAO Y C , CHEN B , et al . Overview of edge computing Data Security and Privacy Protection [J ] . Journal on Communications , 2018 , 39 ( 3 ): 1 - 21 .
BERA B , CHATTARAJ D , DAS A K . Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment [J ] . Computer Communications , 2020 , 153 : 229 - 249 .
YU S , WANG C , REN K , et al . Achieving secure, scalable, and fine-grained data access control in cloud computing [C ] // Proceedings of IEEE INFOCOM . Piscataway : IEEE Press , 2010 : 1 - 9 .
HE X , GAO W . Research on blockchain-based data sharing and access control model [C ] // Proceedings of 2023 IEEE International Conference on Image Processing and Computer Applications (ICIPCA) . Piscataway : IEEE Press , 2023 : 614 - 618 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [C ] // Proceedings of the 14th ACM Conference on Computer and Communications Security . New York : ACM Press , 2007 : 598 - 609 .
JUELS A , KALISKI J . PORs: Proofs of retrievability for large files [C ] // Proceedings of the 14th ACM Conference on Computer and Communications Security . New York : ACM Press , 2007 : 584 - 597 .
王子园 , 杜瑞忠 . 边缘环境下基于无证书公钥密码的数据完整性审计方案 [J ] . 通信学报 , 2022 , 43 ( 7 ): 62 - 72 .
WANG Z Y, DU R Z, A data integrity audit scheme based on certificateless public key cryptography in edge environments [J ] . Journal on Communications , 2022 , 43 ( 7 ): 62 - 72 .
熊金波 , 宋良均 , 孙罡 , 等 . 多接入边缘计算网络的资源共享与激励机制 [J ] . 通信学报 , 2023 , 44 ( 11 ): 67 - 78 .
XIONG J B , SONG L J , SUN G , et al . Resource sharing and incentive mechanism of multi access edge computing network [J ] . Journal on Communications , 2023 , 44 ( 11 ): 67 - 78 .
沈剑 , 周天祺 , 曹珍富 . 云数据安全保护方法综述 [J ] . 计算机研究与发展 , 2021 , 58 ( 10 ): 2079 - 2098 .
SHEN J , ZHOU T Q , CAO Z F . Overview of Cloud Data Security Protection Methods [J ] , Journal of Computer Research and Development , 2021 , 58 ( 10 ): 2079 - 2098 .
WANG Q , WANG C , REN K , et al . Enabling public auditability and data dynamics for storage security in cloud computing [J ] . IEEE Transactions on Parallel and Distributed Systems , 2010 , 22 ( 5 ): 847 - 859 .
KE G , ZHANG W B , WANG X Q , et al . Dual attribute-based auditing scheme for fog computing-based data dynamic storage with distributed collaborative verification [J ] . IEEE Transactions on Network and Service Management , 2023 , 20 ( 4 ): 4982 - 4999 .
ZHU Y , WANG H , HU Z , et al . Dynamic audit services for integrity verification of outsourced storages in clouds [C ] // Proceedings of the 2011 ACM Symposium on Applied Computing . New York : ACM Press , 2011 : 1550 - 1557 .
YANG K , JIA X . An efficient and secure dynamic auditing protocol for data storage in cloud computing [J ] . IEEE transactions on parallel and distributed systems , 2012 , 24 ( 9 ): 1717 - 1726 .
ZHANG X , ZHAO J , XU C , et al . CIPPPA: conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors [J ] . IEEE transactions on cloud Computing , 2019 , 9 ( 4 ): 1362 - 1375 .
WU H , LIU Y , CHENG G , et al . Real-time identification of VPN traffic based on counting Bloom filter and chained hash table from sampled data in high-speed networks [C ] // Proceedings of IEEE International Conference on Communications . Piscataway : IEEE Press , 2022 : 5070 - 5075 .
XUE K , GAI N , HONG J , et al . Efficient and secure attribute-based access control with identical sub-policies frequently used in cloud storage [J ] . IEEE Transactions on Dependable and Secure Computing , 2020 , 19 ( 1 ): 635 - 646 .
SHEN J , SHEN J , CHEN X , et al . An efficient public auditing protocol with novel dynamic structure for cloud data [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 12 ( 10 ): 2402 - 2415 .
0
浏览量
41
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构