Netinfo Security ›› 2023, Vol. 23 ›› Issue (5): 85-94.doi: 10.3969/j.issn.1671-1122.2023.05.009

Previous Articles     Next Articles

An Access Control Scheme for Verifying the Correctness of Outsourcing Encrypted Data in EHR System

ZHANG Xiaoxu, SHI Runhua()   

  1. School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China
  • Received:2022-12-10 Online:2023-05-10 Published:2023-05-15
  • Contact: SHI Runhua E-mail:rhshi@ncepu.edu.cn

Abstract:

To meet the growing demand for telemedicine services, electronic health record (EHR) systems have become popular in recent years. Data owners can upload EHRs to the cloud for data sharing via mobile devices. However, there can be privacy breaches in EHR systems. Attribute-based encryption (ABE) provided a good solution for the secure sharing of data. Usually, mobile devices have limited computing power and it is very difficult to implement the complex encryption operations of ABE. Therefore, this paper assigned heavy encryption operations to the edge server (ES). However, the ES could be subject to attacks. It was crucial to check whether the ES encrypts the correct plaintext. This paper proposed a double-outsourced lightweight verification scheme based on zero-knowledge proofs to check the correctness of the data in the ES. To prevent EHR information from being leaked to dishonest ESs, this paper combined blockchain with hybrid encryption for more secure data sharing. Experimental results show that the proposed scheme is effective.

Key words: edge computing, access control, EHR systems, zero-knowledge proof, data correctness

CLC Number: