ZHANG Xiaoxu,CHEN Yuchen,HA Guanxiong,et al.Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage[J].Journal on Communications,2024,45(09):26-39.
ZHANG Xiaoxu,CHEN Yuchen,HA Guanxiong,et al.Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage[J].Journal on Communications,2024,45(09):26-39. DOI: 10.11959/j.issn.1000-436x.2024169.
Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage
With the development of the electronic medical field
Electronic health record (EHR) are often outsourced to fog nodes for distributed storage to enhance reliability. EHR contains a large amount of private information
however
data outsourcing can create security risks
potentially compromising the integrity and privacy of EHR. In order to ensure the secure storage of EHR
an efficient distributed data integrity auditing scheme based on EHR classification was proposed. The scheme combined classification labels with Bloom filters to enhance auditing efficiency
Shamir’s secret sharing was used for distributed auditing
and attribute-based searchable encryption was employed to protect the privacy of EHR’ category information. Experimental results show that the proposed scheme has low communication and computation costs.
关键词
Keywords
references
HU Y , CHENG L , YAO Q , et al . Exploiting combined locality for wide-stripe erasure coding in distributed storage [C ] // 19th USENIX Conference on File and Storage Technologies (FAST 21) . Berkeley : USENIX Association , 2021 : 233 - 248 .
LI J , NELSON J , MICHAEL E , et al . Pegasus: tolerating skewed workloads in distributed storage with in-network coherence directories [C ] // 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20) . Berkeley : USENIX Association , 2020 : 387 - 406 .
SHICKEL B , TIGHE P J , BIHORAC A , et al . Deep EHR: a survey of recent advances in deep learning techniques for electronic health record (EHR) analysis [J ] . IEEE Journal of Biomedical and Health Informatics , 2017 , 22 ( 5 ): 1589 - 1604 .
DAGLIATI A , MALOVINI A , TIBOLLO V , et al . Health informatics and EHR to support clinical research in the COVID-19 pandemic: an overview [J ] . Briefings in Bioinformatics , 2021 , 22 ( 2 ): 812 - 822 .
GAO H , HUANG H , XUE L , et al . Blockchain-enabled fine-grained searchable encryption with cloud-edge computing for electronic health records sharing [J ] . IEEE Internet of Things Journal , 2023 , 10 ( 20 ): 18414 - 18425 .
XU S , NING J , HUANG X , et al . Untouchable once revoking: a practical and secure dynamic EHR sharing system via cloud [J ] . IEEE Transactions on Dependable and Secure Computing , 2021 , 19 ( 6 ): 3759 - 3773 .
KIMOVSKI D , MEHRAN N , KERTH C E , et al . Mobility-aware IoT applications placement in the cloud edge continuum [J ] . IEEE Transactions on Services Computing , 2021 , 15 ( 6 ): 3358 - 3371 .
SU Y , LI Y , ZHANG K , et al . A privacy-preserving public integrity check scheme for outsourced EHR [J ] . Information Sciences , 2021 , 542 : 112 - 130 .
ZHANG J L , ZHAO Y C , CHEN B , et al . Overview of edge computing Data Security and Privacy Protection [J ] . Journal on Communications , 2018 , 39 ( 3 ): 1 - 21 .
BERA B , CHATTARAJ D , DAS A K . Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment [J ] . Computer Communications , 2020 , 153 : 229 - 249 .
YU S , WANG C , REN K , et al . Achieving secure, scalable, and fine-grained data access control in cloud computing [C ] // Proceedings of IEEE INFOCOM . Piscataway : IEEE Press , 2010 : 1 - 9 .
HE X , GAO W . Research on blockchain-based data sharing and access control model [C ] // Proceedings of 2023 IEEE International Conference on Image Processing and Computer Applications (ICIPCA) . Piscataway : IEEE Press , 2023 : 614 - 618 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [C ] // Proceedings of the 14th ACM Conference on Computer and Communications Security . New York : ACM Press , 2007 : 598 - 609 .
JUELS A , KALISKI J . PORs: Proofs of retrievability for large files [C ] // Proceedings of the 14th ACM Conference on Computer and Communications Security . New York : ACM Press , 2007 : 584 - 597 .
WANG Z Y, DU R Z, A data integrity audit scheme based on certificateless public key cryptography in edge environments [J ] . Journal on Communications , 2022 , 43 ( 7 ): 62 - 72 .
XIONG J B , SONG L J , SUN G , et al . Resource sharing and incentive mechanism of multi access edge computing network [J ] . Journal on Communications , 2023 , 44 ( 11 ): 67 - 78 .
SHEN J , ZHOU T Q , CAO Z F . Overview of Cloud Data Security Protection Methods [J ] , Journal of Computer Research and Development , 2021 , 58 ( 10 ): 2079 - 2098 .
WANG Q , WANG C , REN K , et al . Enabling public auditability and data dynamics for storage security in cloud computing [J ] . IEEE Transactions on Parallel and Distributed Systems , 2010 , 22 ( 5 ): 847 - 859 .
KE G , ZHANG W B , WANG X Q , et al . Dual attribute-based auditing scheme for fog computing-based data dynamic storage with distributed collaborative verification [J ] . IEEE Transactions on Network and Service Management , 2023 , 20 ( 4 ): 4982 - 4999 .
ZHU Y , WANG H , HU Z , et al . Dynamic audit services for integrity verification of outsourced storages in clouds [C ] // Proceedings of the 2011 ACM Symposium on Applied Computing . New York : ACM Press , 2011 : 1550 - 1557 .
YANG K , JIA X . An efficient and secure dynamic auditing protocol for data storage in cloud computing [J ] . IEEE transactions on parallel and distributed systems , 2012 , 24 ( 9 ): 1717 - 1726 .
ZHANG X , ZHAO J , XU C , et al . CIPPPA: conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors [J ] . IEEE transactions on cloud Computing , 2019 , 9 ( 4 ): 1362 - 1375 .
WU H , LIU Y , CHENG G , et al . Real-time identification of VPN traffic based on counting Bloom filter and chained hash table from sampled data in high-speed networks [C ] // Proceedings of IEEE International Conference on Communications . Piscataway : IEEE Press , 2022 : 5070 - 5075 .
XUE K , GAI N , HONG J , et al . Efficient and secure attribute-based access control with identical sub-policies frequently used in cloud storage [J ] . IEEE Transactions on Dependable and Secure Computing , 2020 , 19 ( 1 ): 635 - 646 .
SHEN J , SHEN J , CHEN X , et al . An efficient public auditing protocol with novel dynamic structure for cloud data [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 12 ( 10 ): 2402 - 2415 .