Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems

Shanshan Li,Chunxiang Xu,Yuan Zhang,Yicong Du,Xinsheng Wen,Kefei Chen,Jianfeng Ma
DOI: https://doi.org/10.1109/jsyst.2021.3073169
IF: 4.802
2021-01-01
IEEE Systems Journal
Abstract:In cloud-assisted electronic health (eHealth) systems, outsourced electronic health records (EHRs) have attribute-value type formats: an EHR corresponds to an entry with a unique identity and has multiple types of attribute values. Such formatted EHRs form an attribute-value type database, where both the attribute values and unique identities can serve as keywords for searching. Since EHRs are very sensitive, they are always encrypted before being outsourced, which makes retrieval of target EHRs by either identity or attribute value hard. Moreover, the EHRs are encrypted by different doctors, a researcher, who is delegated to research a certain kind of disease, cannot find out all corresponding EHRs due to the difference of encryption keys. In this article, we construct a triple dictionary index structure for the attribute-value type database to allow a researcher to retrieve encrypted EHRs by the identity and attribute value and to perform dynamic operations over them. We employ an identity server to assist doctors in generating encryption keys via an oblivious way. By doing so, the researcher can retrieve encrypted EHRs without leaking any information to the identity server. We analyze the security and evaluate the performance of our scheme to demonstrate that it achieves <span class="mjpage"><svg xmlns:xlink="http://www.w3.org/1999/xlink" width="1.583ex" height="2.176ex" style="vertical-align: -0.338ex;" viewBox="0 -791.3 681.5 936.9" role="img" focusable="false" xmlns="http://www.w3.org/2000/svg"><g stroke="currentColor" fill="currentColor" stroke-width="0" transform="matrix(1 0 0 -1 0 0)"> <use xlink:href="#MJMATHI-4C" x="0" y="0"></use></g></svg></span>-adaptive security and forward security with high efficiency.<svg xmlns="http://www.w3.org/2000/svg" style="display: none;"><defs id="MathJax_SVG_glyphs"><path stroke-width="1" id="MJMATHI-4C" d="M228 637Q194 637 192 641Q191 643 191 649Q191 673 202 682Q204 683 217 683Q271 680 344 680Q485 680 506 683H518Q524 677 524 674T522 656Q517 641 513 637H475Q406 636 394 628Q387 624 380 600T313 336Q297 271 279 198T252 88L243 52Q243 48 252 48T311 46H328Q360 46 379 47T428 54T478 72T522 106T564 161Q580 191 594 228T611 270Q616 273 628 273H641Q647 264 647 262T627 203T583 83T557 9Q555 4 553 3T537 0T494 -1Q483 -1 418 -1T294 0H116Q32 0 32 10Q32 17 34 24Q39 43 44 45Q48 46 59 46H65Q92 46 125 49Q139 52 144 61Q147 65 216 339T285 628Q285 635 228 637Z"></path></defs></svg>
computer science, information systems,telecommunications,engineering, electrical & electronic,operations research & management science
What problem does this paper attempt to address?