Skip to main content
Log in

An attribute-based keyword search for m-Health networks

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

m-Health stands for mobile health, where mobile devices are used for collecting and distributing health-related data. As the information related to personal health is sensitive in nature, so it should be encrypted first before storing it at the potentially untrusted servers. However, encryption severely affects basic sharing and search operations. To address these issues, a combination of attribute-based encryption and searchable encryption is devised, which enables secure fine-grained search over encrypted data. But the resultant technique incurs high computational complexity, which makes it unsuitable for resource-constrained mobile devices. So, in order to deploy it to mobile devices, searchable encryption should generate constant size secret keys and ciphertexts. However, in existing attribute-based keyword search (ABKS) schemes, the size of the secret key and the ciphertext is proportional to the number of attributes, thus resulting in linear complexity. In this paper, we have proposed a novel ABKS scheme with constant-size secret keys and ciphertexts, thus further reducing the computational cost. Our scheme uses a ciphertext-policy (CP) design framework and supports an AND gate access structure. Further, the proposed CP-ABKS scheme can be proved secure in the selective security model under augmented multi-sequence of exponents decisional Diffie-Hellman assumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98 (2006)

  2. Bethencourt, J.,Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP’07), pp. 321–334 (2007)

  3. Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: International Colloquium on Automata, Languages, and Programming, pp. 579–591 (2008)

  4. Tan, Y.-L., Goi, B.-M., Komiya, R., Tan, S.-Y.: A study of attribute-based encryption for body sensor networks. In: International Conference on Informatics Engineering and Information Science, pp. 238–247 (2011)

  5. Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Infocom, 2014 Proceedings IEEE, pp. 522–530 (2014)

  6. Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(4), 1187–1198 (2016)

    Article  Google Scholar 

  7. Li, J., Lin, X., Zhang, Y., Han, J.: KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans. Serv. Comput. 10(5), 715–725 (2017)

    Article  Google Scholar 

  8. Hu, B., Liu, Q., Liu, X., Peng, T., Wang, G., Wu, J.: DABKS: dynamic attribute-based keyword search in cloud computing. In: 2017 IEEE International Conference on Communications (ICC), pp. 1–6 (2017)

  9. Wang, H., Dong, X., Cao, Z.: Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search. IEEE Transactions on Services Computing (2017). https://doi.org/10.1109/TSC.2017.2753231

    Article  Google Scholar 

  10. Qiu, S., Liu, J., Shi, Y., Zhang, R.: Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Sci. China Inf. Sci. 60(5), 52105 (2017)

    Article  MathSciNet  Google Scholar 

  11. Cui, H., Wan, Z., Deng, R.H., Wang, G., Li, Y.: Efficient and expressive keyword search over encrypted data in cloud. IEEE Trans. Dependable Secur. Comput. 3, 409–422 (2018)

    Article  Google Scholar 

  12. Gupta, B. B.: An efficient KP design framework of attribute‐based searchable encryption for user level revocation in cloud. Concurrency Comput: Pract Experience, e5291. (2019) https://doi.org/10.1002/cpe.5291

  13. Mamta, Gupta, B.B., Ali, S.T.: Dynamic policy attribute based encryption and its application in generic construction of multi-keyword search. Int. J. E-Services Mob. Appl. 11(4), 16–38 (2019)

    Article  Google Scholar 

  14. Mamta, Gupta, B.B.: Secure fine-grained keyword search with protection from key abusers in the cloud. In: 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE), pp. 679–683 (2019)

  15. Mamta, Gupta, B.B.: An attribute-based searchable encryption scheme for non-monotonic access structure. In: Handbook of Research on Intrusion Detection Systems, IGI Global, pp. 263–283 (2020)

  16. Yang, Y.: Attribute-based data retrieval with semantic keyword search for e-health cloud. J. Cloud Comput. 4(1), 10 (2015)

    Article  Google Scholar 

  17. Miao, Y., Ma, J., Liu, X., Wei, F., Liu, Z., Wang, X.A.: m2-ABKS: attribute-based multi-keyword search over encrypted personal health records in multi-owner setting. J. Med. Syst. 40(11), 246 (2016)

    Article  Google Scholar 

  18. Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., Choo, K.-K.R.: Fine-grained database field search using attribute-based encryption for e-healthcare clouds. J. Med. Syst. 40(11), 235 (2016)

    Article  Google Scholar 

  19. Zhang, R., Xue, R., Liu, L.: Searchable encryption for healthcare clouds: a survey. IEEE Trans. Serv. Comput. 6, 978–996 (2018)

    Article  Google Scholar 

  20. Chen, Z., et al.: Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control. Futur. Gener. Comput. Syst. 87, 712–724 (2018)

    Article  Google Scholar 

  21. Ramu, G.: A secure cloud framework to share EHRs using modified CP-ABE and the attribute bloom filter. Educ. Inf. Technol. 23(5), 2213–2233 (2018)

    Article  Google Scholar 

  22. Zhou, Y., Zhao, X., Liu, S., Long, X., Luo, W.: A time-aware searchable encryption scheme for EHRs. Digit. Commun. Netw. 5(3), 170–175 (2019)

    Article  Google Scholar 

  23. Chen, L., Lee, W.-K., Chang, C.-C., Choo, K.-K.R., Zhang, N.: Blockchain based searchable encryption for electronic health record sharing. Futur. Gener. Comput. Syst. 95, 420–429 (2019)

    Article  Google Scholar 

  24. Kerschbaum, F., Tueno, A.: An efficiently searchable encrypted data structure for range queries. In: European Symposium on Research in Computer Security, pp. 344–364 (2019)

  25. Odelu, V., Das, A.K., Rao, Y.S., Kumari, S., Khan, M.K., Choo, K.-K.R.: Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput. Stand. Interfaces 54, 3–9 (2017)

    Article  Google Scholar 

  26. Guo, F., Mu, Y., Susilo, W., Wong, D.S., Varadharajan, V.: CP-ABE with constant-size keys for lightweight devices. IEEE Trans. Inf. Forensics Secur. 9(5), 763–771 (2014)

    Article  Google Scholar 

  27. Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. J. Cryptol. 20(3), 265–294 (2007)

    Article  MathSciNet  Google Scholar 

  28. Lynn, B.: On the Implementation of Pairing-Based Cryptosystems. Stanford University, Stanford (2007)

    Google Scholar 

  29. De Caro, A., Iovino, V.: jPBC: Java pairing based cryptography. In: 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 850–855 (2011)

  30. Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 226–234 (2014)

  31. Cui, J., Zhou, H., Zhong, H., Xu, Y.: AKSER: Attribute-based keyword search with efficient revocation in cloud computing. Inf. Sci. (Ny) 423, 343–352 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

This publication is an outcome of the R&D work undertaken under the project Visvesvaraya PhD Scheme of Ministry of Electronics & Information Technology, Government of India and being implemented by Digital India Corporation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Brij Gupta.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mamta, Gupta, B. An attribute-based keyword search for m-Health networks. J Comput Virol Hack Tech 17, 21–36 (2021). https://doi.org/10.1007/s11416-020-00361-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-020-00361-z

Keywords

Navigation