{"title":"具有可追溯性的匿名大宇宙医疗云存储数据共享方案","authors":"Qing Wu , Guoqiang Meng , Leyou Zhang , Yue Lei","doi":"10.1016/j.sysarc.2024.103210","DOIUrl":null,"url":null,"abstract":"<div><p>The application of medical cloud storage technology in healthcare and the sharing of electronic medical records (EMR) bring convenience for patients and medical institutes. However, two barriers limit further expansions of the above (i.e. key escrow and key abuse issues). In this paper, we construct a large universe data-sharing scheme based on attribute-based encryption. We design all attribute authorities simultaneously to participate in the key computation, and the user performs aggregation. By issuing anonymous credentials to the recipients, their identity information is protected. To achieve complete tracing of the traitor, we blend the two mechanisms, white-box traceability and black-box traceability, together. Detailed security proofs have been carried out for various types of possible attackers, and theoretical analyses have verified the security of the proposed scheme. We performed performance evaluations in conjunction with existing schemes, and numerical experience shows that the burden on the user side is also minimal.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"153 ","pages":"Article 103210"},"PeriodicalIF":3.7000,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage\",\"authors\":\"Qing Wu , Guoqiang Meng , Leyou Zhang , Yue Lei\",\"doi\":\"10.1016/j.sysarc.2024.103210\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>The application of medical cloud storage technology in healthcare and the sharing of electronic medical records (EMR) bring convenience for patients and medical institutes. However, two barriers limit further expansions of the above (i.e. key escrow and key abuse issues). In this paper, we construct a large universe data-sharing scheme based on attribute-based encryption. We design all attribute authorities simultaneously to participate in the key computation, and the user performs aggregation. By issuing anonymous credentials to the recipients, their identity information is protected. To achieve complete tracing of the traitor, we blend the two mechanisms, white-box traceability and black-box traceability, together. Detailed security proofs have been carried out for various types of possible attackers, and theoretical analyses have verified the security of the proposed scheme. We performed performance evaluations in conjunction with existing schemes, and numerical experience shows that the burden on the user side is also minimal.</p></div>\",\"PeriodicalId\":50027,\"journal\":{\"name\":\"Journal of Systems Architecture\",\"volume\":\"153 \",\"pages\":\"Article 103210\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2024-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Systems Architecture\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1383762124001474\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Systems Architecture","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1383762124001474","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage
The application of medical cloud storage technology in healthcare and the sharing of electronic medical records (EMR) bring convenience for patients and medical institutes. However, two barriers limit further expansions of the above (i.e. key escrow and key abuse issues). In this paper, we construct a large universe data-sharing scheme based on attribute-based encryption. We design all attribute authorities simultaneously to participate in the key computation, and the user performs aggregation. By issuing anonymous credentials to the recipients, their identity information is protected. To achieve complete tracing of the traitor, we blend the two mechanisms, white-box traceability and black-box traceability, together. Detailed security proofs have been carried out for various types of possible attackers, and theoretical analyses have verified the security of the proposed scheme. We performed performance evaluations in conjunction with existing schemes, and numerical experience shows that the burden on the user side is also minimal.
期刊介绍:
The Journal of Systems Architecture: Embedded Software Design (JSA) is a journal covering all design and architectural aspects related to embedded systems and software. It ranges from the microarchitecture level via the system software level up to the application-specific architecture level. Aspects such as real-time systems, operating systems, FPGA programming, programming languages, communications (limited to analysis and the software stack), mobile systems, parallel and distributed architectures as well as additional subjects in the computer and system architecture area will fall within the scope of this journal. Technology will not be a main focus, but its use and relevance to particular designs will be. Case studies are welcome but must contribute more than just a design for a particular piece of software.
Design automation of such systems including methodologies, techniques and tools for their design as well as novel designs of software components fall within the scope of this journal. Novel applications that use embedded systems are also central in this journal. While hardware is not a part of this journal hardware/software co-design methods that consider interplay between software and hardware components with and emphasis on software are also relevant here.