4.8 Article

Blockchain-Enabled Fine-Grained Searchable Encryption With Cloud-Edge Computing for Electronic Health Records Sharing

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data

Yinghui Zhang et al.

Summary: In cloud data sharing systems, the issue of inaccurate search results and inefficient resource usage in Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) schemes is addressed. A multi-keyword search scheme is proposed that combines Ciphertext Policy Attribute-Based Encryption (CP-ABE) technology with the shared multi-owner mechanism to ensure efficient verification of search results and security against offline keyword guessing attacks. Experimental results demonstrate the effectiveness and superiority of the proposed scheme.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Theory & Methods

BA-RMKABSE: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System

Jian Su et al.

Summary: This paper focuses on the current hot issues in the field of secure sharing of medical data, and proposes a blockchain-based search framework to address issues such as search accuracy and privacy protection. Through the introduction of smart contracts and attribute-based encryption, efficient and secure searching and protection of medical data are achieved.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Information Systems

Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System

Yangyang Bao et al.

Summary: This article introduces the trend of building a smart healthcare system using the Internet of Things (IoT) and cloud computing. It proposes a lightweight attribute-based searchable encryption (LABSE) scheme to address the challenges of retrieving encrypted health data stored in the cloud. The article rigorously proves the semantic security of the LABSE scheme, analyzes security properties, and compares it with other related schemes. The practicality and performance advantages of the LABSE scheme are demonstrated through experiments.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Hardware & Architecture

Blockchain-assisted searchable attribute-based encryption for e-health systems

Xinyin Xiang et al.

Summary: The Internet of Things (IoT) is increasingly used for transmitting large amounts of data, and cloud storage is considered the optimal way to process data with limited IoT devices. However, enabling end users to publish search queries and implement fine-grained access control over ciphertext simultaneously remains a challenge. This paper introduces blockchain-assisted searchable attribute-based encryption (SABE) to achieve data confidentiality and fine-grained access control.

JOURNAL OF SYSTEMS ARCHITECTURE (2022)

Article Computer Science, Information Systems

Self-Renewal Consortium Blockchain Based on Proof of Rest and Strong Smart Contracts

Wenyu Shen et al.

Summary: This paper presents a new consensus mechanism called proof of rest (PoR) and strong smart contracts for business alliance scenarios in blockchains. The block structure and logic of PoR consensus are described, and a consortium blockchain system supporting strong smart contracts is designed. By modifying the difficulty value algorithm based on proof of work (PoW) and adding adjustable parameters, the mechanism allows nodes that rest longer after creating a block to have an easier time creating another new block, hence the term PoR. The penalty for slack nodes, joining and quitting of nodes, and adjustment of block creation time can all be achieved using strong smart contracts, enabling self-renewal of the consortium blockchain.

TSINGHUA SCIENCE AND TECHNOLOGY (2022)

Article Computer Science, Information Systems

Multidata-Owner Searchable Encryption Scheme Over Medical Cloud Data With Efficient Access Control

Sherif Abdelfattah et al.

Summary: The study proposes an efficient ABE approach to protect the privacy of medical data. Patients use this method to encrypt the key of the document, so that only authorized doctors can decrypt it. Existing schemes have limitations such as inefficient access control and single data-owner setting.

IEEE SYSTEMS JOURNAL (2022)

Article Computer Science, Information Systems

Verifiable Multikeyword Search Encryption Scheme With Anonymous Key Generation for Medical Internet of Things

Xueyan Liu et al.

Summary: This article proposes a multikeyword searchable encryption scheme based on attributes to preserve the data security and integrity verification of medical IoT data stored on the IoT cloud platform, while ensuring the application business functions.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Automation & Control Systems

A Survey on Edge and Edge-Cloud Computing Assisted Cyber-Physical Systems

Kun Cao et al.

Summary: This article investigates the quality-of-service optimization of edge computing or edge-cloud computing assisted CPS designs, discussing challenges during integration and summarizing current research and future directions.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Automation & Control Systems

Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System

Mamta et al.

Summary: The concept of sharing personal health data through cloud storage in healthcare-cyber physical systems has gained popularity by improving access quality. While attribute-based searchable encryption (ABSE) provides fine-grained searching capabilities in shared cloud storage, it is not practical for devices with limited resources. The proposed scheme manages computational costs by executing intensive tasks on the blockchain network, offering decentralization and efficiency benefits.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2021)

Review Computer Science, Information Systems

Empowering Things With Intelligence: A Survey of the Progress, Challenges, and Opportunities in Artificial Intelligence of Things

Jing Zhang et al.

Summary: This article discusses the importance of integrating artificial intelligence into the Internet of Things, and how AI can make IoT faster, smarter, greener, and safer. Additionally, it summarizes the AIoT architecture, four research perspectives, and some promising applications.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Securing smart healthcare system with edge computing

Ashish Singh et al.

Summary: With the increasing sensitivity of medical data, the importance of a Smart Healthcare System is emphasized. The edge computing architecture shows great potential in protecting patient data privacy and reducing response time.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

BEdgeHealth: A Decentralized Architecture for Edge-Based IoMT Networks Using Blockchain

Dinh C. Nguyen et al.

Summary: The proposed BEdgeHealth architecture integrates MEC and blockchain for data offloading and data sharing in distributed hospital networks, addressing critical technical challenges such as low QoS, data privacy, and system security vulnerabilities. The architecture includes a data offloading scheme and a data-sharing scheme, with a smart contract-based authentication mechanism for decentralized user access verification. Real-world experiment results demonstrate improved QoS with data privacy and security guarantees compared to existing schemes.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data

Yinbin Miao et al.

Summary: This paper introduces a secure Multi-authority CP-ABKS (MABKS) system to address limitations in existing CP-ABKS schemes and minimize the computation and storage burden on resource-limited devices in cloud systems. The MABKS system is selectively secure in both selective-matrix and selective-attribute models, demonstrating efficiency and utility in practical applications.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

Enabling Authorized Encrypted Search for Multi-Authority Medical Databases

Lei Xu et al.

Summary: Electronic medical records should be stored in encrypted form in a medical database, but simple encryption may affect data utility and interoperability. Authorizing different clients to securely search and access records from multiple authorities is a challenge, and a scheme for authorized searchable encryption has been proposed to address this issue.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)

Article Computer Science, Theory & Methods

A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling

Laphou Lao et al.

ACM COMPUTING SURVEYS (2020)

Article Computer Science, Information Systems

Blockchain Meets Cloud Computing: A Survey

Keke Gai et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

A Survey of Distributed Consensus Protocols for Blockchain Networks

Yang Xiao et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Automation & Control Systems

SAFE: SDN-Assisted Framework for Edge-Cloud Interplay in Secure Healthcare Ecosystem

Gagangeet Singh et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Hardware & Architecture

Blockchain-based searchable symmetric encryption scheme

Huige Li et al.

COMPUTERS & ELECTRICAL ENGINEERING (2019)

Article Computer Science, Theory & Methods

Blockchain based searchable encryption for electronic health record sharing

Lanxiang Chen et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Review Computer Science, Hardware & Architecture

A survey on privacy protection in blockchain system

Qi Feng et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Information Systems

Searchable Encryption for Healthcare Clouds: A Survey

Rui Zhang et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2018)

Article Computer Science, Information Systems

Privacy-Preserving Search Over Encrypted Personal Health Record In Multi-Source Cloud

Xin Yao et al.

IEEE ACCESS (2018)

Article Computer Science, Theory & Methods

Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

Yang Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System

Jun Zhou et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2015)