4.4 Article

Lightweight and fine-grained access control for cloud-fog-based electronic medical record sharing systems

Journal

Publisher

WILEY
DOI: 10.1002/dac.4909

Keywords

access control; electronic medical record sharing; privacy protection; security

Funding

  1. National Natural Science Foundation of China [62072005, 62001246]
  2. Natural Science Foundation of Anhui Province [1808085MF164]
  3. Scientific Research Staring Foundation of Anhui Normal University [2018XJJ40]

Ask authors/readers for more resources

This paper presents a lightweight and fine-grained access control method for EMR sharing, by combining fog and cloud using symmetric encryption algorithm and attribute-based encryption algorithm.
The electronic medical record (EMR) sharing systems promote medical services' efficiency, save human resources, and reduce energy consumption. A number of patients are ready to store their medical records in cloud. Nevertheless, owing to the medical record's privacy sensitivity, security problems are of critical importance in EMR sharing systems. This work presents a lightweight and fine-grained access control with data security for EMR sharing by combining fog and cloud using symmetric encryption algorithm and attribute-based encryption algorithm. Data owners encrypt the medical records with symmetric encryption and store them in cloud. The symmetric key is protected by ciphertext-policy attribute-based encryption and stored in fog. The keyword extracted from medical record is encrypted by data owner with key-policy attribute-based keyword search encryption and sent to fog. The requesters who satisfy with the keyword ciphertext's access policy can search for the keyword. They are capable of accessing the symmetric key if their attributes satisfy with the symmetric key ciphertext's access policy. The key management method and access control scheme guarantee the medical record's security and privacy. Security analysis demonstrates that our work is able to achieve privacy protection, secure search, fine-grained access control, and collusion resistance.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available