Abstract
m-Health stands for mobile health, where mobile devices are used for collecting and distributing health-related data. As the information related to personal health is sensitive in nature, so it should be encrypted first before storing it at the potentially untrusted servers. However, encryption severely affects basic sharing and search operations. To address these issues, a combination of attribute-based encryption and searchable encryption is devised, which enables secure fine-grained search over encrypted data. But the resultant technique incurs high computational complexity, which makes it unsuitable for resource-constrained mobile devices. So, in order to deploy it to mobile devices, searchable encryption should generate constant size secret keys and ciphertexts. However, in existing attribute-based keyword search (ABKS) schemes, the size of the secret key and the ciphertext is proportional to the number of attributes, thus resulting in linear complexity. In this paper, we have proposed a novel ABKS scheme with constant-size secret keys and ciphertexts, thus further reducing the computational cost. Our scheme uses a ciphertext-policy (CP) design framework and supports an AND gate access structure. Further, the proposed CP-ABKS scheme can be proved secure in the selective security model under augmented multi-sequence of exponents decisional Diffie-Hellman assumption.
Similar content being viewed by others
References
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98 (2006)
Bethencourt, J.,Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP’07), pp. 321–334 (2007)
Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: International Colloquium on Automata, Languages, and Programming, pp. 579–591 (2008)
Tan, Y.-L., Goi, B.-M., Komiya, R., Tan, S.-Y.: A study of attribute-based encryption for body sensor networks. In: International Conference on Informatics Engineering and Information Science, pp. 238–247 (2011)
Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Infocom, 2014 Proceedings IEEE, pp. 522–530 (2014)
Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(4), 1187–1198 (2016)
Li, J., Lin, X., Zhang, Y., Han, J.: KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans. Serv. Comput. 10(5), 715–725 (2017)
Hu, B., Liu, Q., Liu, X., Peng, T., Wang, G., Wu, J.: DABKS: dynamic attribute-based keyword search in cloud computing. In: 2017 IEEE International Conference on Communications (ICC), pp. 1–6 (2017)
Wang, H., Dong, X., Cao, Z.: Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search. IEEE Transactions on Services Computing (2017). https://doi.org/10.1109/TSC.2017.2753231
Qiu, S., Liu, J., Shi, Y., Zhang, R.: Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Sci. China Inf. Sci. 60(5), 52105 (2017)
Cui, H., Wan, Z., Deng, R.H., Wang, G., Li, Y.: Efficient and expressive keyword search over encrypted data in cloud. IEEE Trans. Dependable Secur. Comput. 3, 409–422 (2018)
Gupta, B. B.: An efficient KP design framework of attribute‐based searchable encryption for user level revocation in cloud. Concurrency Comput: Pract Experience, e5291. (2019) https://doi.org/10.1002/cpe.5291
Mamta, Gupta, B.B., Ali, S.T.: Dynamic policy attribute based encryption and its application in generic construction of multi-keyword search. Int. J. E-Services Mob. Appl. 11(4), 16–38 (2019)
Mamta, Gupta, B.B.: Secure fine-grained keyword search with protection from key abusers in the cloud. In: 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE), pp. 679–683 (2019)
Mamta, Gupta, B.B.: An attribute-based searchable encryption scheme for non-monotonic access structure. In: Handbook of Research on Intrusion Detection Systems, IGI Global, pp. 263–283 (2020)
Yang, Y.: Attribute-based data retrieval with semantic keyword search for e-health cloud. J. Cloud Comput. 4(1), 10 (2015)
Miao, Y., Ma, J., Liu, X., Wei, F., Liu, Z., Wang, X.A.: m2-ABKS: attribute-based multi-keyword search over encrypted personal health records in multi-owner setting. J. Med. Syst. 40(11), 246 (2016)
Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., Choo, K.-K.R.: Fine-grained database field search using attribute-based encryption for e-healthcare clouds. J. Med. Syst. 40(11), 235 (2016)
Zhang, R., Xue, R., Liu, L.: Searchable encryption for healthcare clouds: a survey. IEEE Trans. Serv. Comput. 6, 978–996 (2018)
Chen, Z., et al.: Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control. Futur. Gener. Comput. Syst. 87, 712–724 (2018)
Ramu, G.: A secure cloud framework to share EHRs using modified CP-ABE and the attribute bloom filter. Educ. Inf. Technol. 23(5), 2213–2233 (2018)
Zhou, Y., Zhao, X., Liu, S., Long, X., Luo, W.: A time-aware searchable encryption scheme for EHRs. Digit. Commun. Netw. 5(3), 170–175 (2019)
Chen, L., Lee, W.-K., Chang, C.-C., Choo, K.-K.R., Zhang, N.: Blockchain based searchable encryption for electronic health record sharing. Futur. Gener. Comput. Syst. 95, 420–429 (2019)
Kerschbaum, F., Tueno, A.: An efficiently searchable encrypted data structure for range queries. In: European Symposium on Research in Computer Security, pp. 344–364 (2019)
Odelu, V., Das, A.K., Rao, Y.S., Kumari, S., Khan, M.K., Choo, K.-K.R.: Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput. Stand. Interfaces 54, 3–9 (2017)
Guo, F., Mu, Y., Susilo, W., Wong, D.S., Varadharajan, V.: CP-ABE with constant-size keys for lightweight devices. IEEE Trans. Inf. Forensics Secur. 9(5), 763–771 (2014)
Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. J. Cryptol. 20(3), 265–294 (2007)
Lynn, B.: On the Implementation of Pairing-Based Cryptosystems. Stanford University, Stanford (2007)
De Caro, A., Iovino, V.: jPBC: Java pairing based cryptography. In: 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 850–855 (2011)
Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 226–234 (2014)
Cui, J., Zhou, H., Zhong, H., Xu, Y.: AKSER: Attribute-based keyword search with efficient revocation in cloud computing. Inf. Sci. (Ny) 423, 343–352 (2018)
Acknowledgements
This publication is an outcome of the R&D work undertaken under the project Visvesvaraya PhD Scheme of Ministry of Electronics & Information Technology, Government of India and being implemented by Digital India Corporation.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mamta, Gupta, B. An attribute-based keyword search for m-Health networks. J Comput Virol Hack Tech 17, 21–36 (2021). https://doi.org/10.1007/s11416-020-00361-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-020-00361-z