Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing

In the cloud applications of medical data based on blockchain, doctors and managers usually want to obtain image data shared by other healthcare institutions. To ensure the privacy and workability of the image data, it is necessary to encrypt plain image data, retrieve cypher data and verify the authenticity of the data. Public key authenticated searchable encryption (PAEKS) is an effective mechanism to realize the privacy and workability properties of data. However, the existing PAEKS schemes are unable to realize the identity privacy protection of the data owner, and the traditional blockchain system (such as the Bitcoin) cannot achieve these goals directly. To overcome the above drawback, we first present a deniably authenticated searchable encryption scheme for medical image data sharing (DASES) that is based on blockchain and deniably authenticated encryption technology. The DASES takes advantage of blockchain technology to ensure the non-tampered, unforgettable and traceability of the image data, and it also avoids the limitation of the blockchain’s own storage and computing power. The DASES can not only withstand inside keyword guessing attack (IKGA) but also provide effective privacy protection and verify the authenticity of medical image data. Hence, it can better protect the privacy of data senders and provide stronger security. Next, we prove that the DASES satisfies the indistinguishability of the ciphertext and trapdoor. It is regrettable that the DASES is less efficient than related schemes in the literature, but its greatest strength is its ability to provide better identity privacy protection and stronger security.

[1]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[2]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[3]  Long Wen,et al.  Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search , 2019, IEEE Access.

[4]  Fagen Li,et al.  An Efficient Identity-Based Deniable Authenticated Encryption Scheme , 2015, KSII Trans. Internet Inf. Syst..

[5]  D. Dimitrov Medical Internet of Things and Big Data in Healthcare , 2016, Healthcare informatics research.

[6]  Haiyong Luo,et al.  An RSSI gradient-based AP localization algorithm , 2014, China Communications.

[7]  Jiguo Li,et al.  Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks , 2021, IEEE Transactions on Services Computing.

[8]  Peng Changgen,et al.  Certificateless public key encryption with keyword search , 2014, China Communications.

[9]  EmuraKeita,et al.  Generic constructions of secure-channel free searchable encryption with adaptive security , 2015 .

[10]  Fangguo Zhang,et al.  A Searchable Symmetric Encryption Scheme using BlockChain , 2017, ArXiv.

[11]  Jian Shen,et al.  Designated-server identity-based authenticated encryption with keyword search for encrypted emails , 2019, Inf. Sci..

[12]  Wei-Ying Ma,et al.  Benchmarking of image features for content-based retrieval , 1998, Conference Record of Thirty-Second Asilomar Conference on Signals, Systems and Computers (Cat. No.98CH36284).

[13]  Sherali Zeadally,et al.  Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[14]  Atsuko Miyaji,et al.  Generic constructions of secure-channel free searchable encryption with adaptive security , 2015, Secur. Commun. Networks.

[15]  Jeng-Shyang Pan,et al.  On the Security of a Certificateless Searchable Public Key Encryption Scheme , 2016, ICGEC.

[16]  Debiao He,et al.  Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things , 2019, Ann. des Télécommunications.

[17]  Jianhua Chen,et al.  Certificateless searchable public key encryption scheme for mobile healthcare system , 2017, Comput. Electr. Eng..

[18]  Fagen Li,et al.  Efficient Deniably Authenticated Encryption and Its Application to E-Mail , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[20]  Qiong Huang,et al.  An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks , 2017, Inf. Sci..

[21]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[22]  Xin Huang,et al.  A Secure System For Pervasive Social Network-Based Healthcare , 2016, IEEE Access.

[23]  Dong Hoon Lee,et al.  Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.

[24]  Chunhua Jin,et al.  Certificateless deniably authenticated encryption and its application to e-voting system , 2018, Telecommun. Syst..

[25]  Dong Hoon Lee,et al.  Generic construction of designated tester public-key encryption with keyword search , 2012, Inf. Sci..

[26]  Ling Liu,et al.  A Decentralizing Attribute-Based Signature for Healthcare Blockchain , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).