CN109858283A - A kind of cloud storage secure data sharing method based on Chaum-Perdesen - Google Patents

A kind of cloud storage secure data sharing method based on Chaum-Perdesen Download PDF

Info

Publication number
CN109858283A
CN109858283A CN201910142859.9A CN201910142859A CN109858283A CN 109858283 A CN109858283 A CN 109858283A CN 201910142859 A CN201910142859 A CN 201910142859A CN 109858283 A CN109858283 A CN 109858283A
Authority
CN
China
Prior art keywords
data
user
group
owner
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910142859.9A
Other languages
Chinese (zh)
Other versions
CN109858283B (en
Inventor
王鑫
韩志宇
周彦伟
张磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi University of Science and Technology
Original Assignee
Shaanxi University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi University of Science and Technology filed Critical Shaanxi University of Science and Technology
Priority to CN201910142859.9A priority Critical patent/CN109858283B/en
Publication of CN109858283A publication Critical patent/CN109858283A/en
Application granted granted Critical
Publication of CN109858283B publication Critical patent/CN109858283B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

With the development of cloud computing technology, data can be contracted out to cloud and share between user to facilitate.But in many cases, user may worry that it is outsourced to the reliability of the data of cloud and integrality, therefore provide and meet the data sharing services of these safety requirements and seem most important.The present invention uses Threshold key sharing technology and Chaum-Pedersen zero-knowledge proof method, proposes a kind of reliable, safety data-sharing scheme.The program is not only flexibly effective, but also can be realized Semantic Security characteristic.In addition, if some user behaviors are dishonest, this scheme can ensure the safety of user's decruption key and and identify fraudster.Efficiency analysis shows that compared with other related works, this scheme is being calculated as present aspect with better performance.Particularly, the program is suitable for protecting the cloud Medicare data of user.

Description

A kind of cloud storage secure data sharing method based on Chaum-Perdesen
Technical field
The invention belongs to field of information security technology, are particularly suitable for the cloud Medicare data of protection user, are one Cloud storage secure data sharing method of the kind based on Chaum-Perdesen.
Background technique
Cloud innovation and development trend it is strong promotion under, cloud computing, cloud storage data sharing technology become allow File owner facilitates storage, and user facilitates a kind of promising technology of access.However, in storage, shared data, file Owner becomes more concerned with the privacy of storage and the reliable access of data.Health care data covers the Fang Fang of the life of the mankind Face face, it contains various data, such as medical record information, medical insurance information, health account, gene information, medical experiment With scientific data etc..Medical experiment data, scientific data and insurance information are not only related to the privacy of data owner, have an effect on The development trend of pharmaceuticals industry, or even influence national security.Therefore, in the development process and application of Health care data, have It is necessary to provide for data source authentication and medical data type and targetedly close rule guarantee.
When her Medicare data is stored in the cloud (die by visitation of God, insurance claim etc.) in case of need by a people When, it should thinking better of permission, who accesses the data.In the process, due to the diversity and complexity of medical data, in number According to the confidentiality for not only needing to consider data itself in storing process, it is also necessary to consider the particularity of actual conditions.
In medical services scene based on cloud, (such as electronics is sick by above-mentioned important personal information by patient (data owner) Go through, health account, consultation information and financial information) it is stored in the cloud with ciphertext form, the access authority of file is divided into multiple Copy, and assign these to different types of group, such as family's group, friend's group, medical worker's group, finance information management group, In each group be made of multiple users.When an emergency situation is encountered or unexpected death and needs to extract by patient (data owner) When stating the proof of information, even if patient can not provide, it can also be provided by one group of user.In this process, in order to guarantee to believe Cease the fairness extracted, it is important to allow the permission of a few users fail, prevent fraudster from invading individual interest and not sincere Real user provides false permission.
Summary of the invention
In order to overcome the disadvantages of the above prior art, reach the demand of above-mentioned scene, the purpose of the present invention is to provide one Cloud storage secure data sharing method of the kind based on Chaum-Perdesen, symmetric cryptography and key technology of sharing are combined, It can verify that and can cheat identification, data owner oneself can specify authorized user to ensure the safety of personal data;According to The type at family is grouped management, to exercise supervision when accessing data, to realize the Decentralization of permission;This Outside, according to the validity of data and fairness, the behavior of any interference normal data access can be identified, thoroughly to ensure The stability of system makes its normal operation.The present invention uses Threshold key sharing technology and Chaum-Pedersen zero-knowledge proof Method has the characteristics that reliable, safety, can rise in terms of solving the above-mentioned medical data management in interconnection network personal health environment To basic, enlightening effect.
To achieve the goals above, the technical solution adopted by the present invention is that:
A kind of cloud storage secure data sharing method based on Chaum-Perdesen, it is characterised in that:
It will be hidden with the incoherent confidential information of significant data, significant data will be encrypted and stored in cloud;
The type that authorized user is corresponded to significant data, is divided into several groups;
The corresponding one group of secret shadow of every part of significant data, every group of secret shadow by multiple and different owners secret shadow group At each secret shadow uses the threshold secret sharing method of Shamir, is assigned to corresponding authorized user's group, is each Authorized user, which organizes, specifies a decruption key, and the authorized user of each authorized user's group distributes its private according to the decruption key of the group Key, i.e., the sub- code key of this group decruption key could decrypt corresponding secret part of significant data when correctly reconstructing decruption key Volume, so that realizing that mutually supervision is lower between the groups decrypts significant data.
The data are Medicare data, described to refer to that the personal of the owner is believed with the incoherent confidential information of significant data Breath, including name, age, Work Home, address etc.;The significant data refers to the number directly related with medical insurance of the owner According to, including electronic health record, health records, consultation information and financial information, the identity of the authorized user and the class of significant data Type is corresponding, including family's group, friend's group, medical worker's group and finance information management group.
It is described to be hidden with the incoherent confidential information of significant data by the methods of Bloom filter.
Compared with existing data-sharing scheme, the program can provide safety and the odds for effectiveness of following aspect:
1) Cloud Server can use data file label auxiliary record search, and can not obtain any about the owner The significant information of data or owner individual's private data.
2) user of accessible data file is authorized by data owner, and data owner can verify owner's transmission Decruption key.Incorrect even if from certain decruption keys of authorized user, system still can be operated normally without influencing The reliability of data.
3) it can identify in advance and the dishonest user of pseudo- decruption key is provided, the decryption without leaking honest user is close Key.Therefore, can under the supervision of these user groups safe and correct ground ciphertext data file.
Detailed description of the invention
Fig. 1 is the frame of safe shared data protection service in cloud environment of the present invention.
Specific embodiment
The embodiment that the present invention will be described in detail with reference to the accompanying drawings and examples.
As shown in Figure 1, effectively the invention proposes one, reliable and integrated internet medical data secret sharing, with Ensure Semantic Security and efficiently uses owner's data in cloud storage.By the methods of Bloom filter hide patient with The incoherent confidential information of significant data, such as name, the age, work, home address etc., and significant data file, such as electronics disease It goes through, health records, consultation information and financial information are then encrypted and stored in cloud.
Secret data file is decrypted in order to realize that between the groups mutually supervision is lower, decruption key is used in cloud decrypted user Permission is distributed, identity when these authorized users register in the protocol according to them is divided into several groups, such as family's group, friend Group, medical worker's group, finance information management group etc..Each data file corresponds to one group of secret shadow, and each secret shadow is logical The threshold secret sharing method using Shamir is crossed, the user group corresponded to is assigned to, an each group of specified decryption is close Key, each group of authorized user distribute its private key, i.e., the sub- code key of this group decruption key, when correct according to the decruption key of the group When ground reconstructs decruption key, so that it may the successfully corresponding secret shadow of ciphertext data file.
The pre-knowledge having needed for understanding the present invention is introduced first:
1, key secret sharing
Key secret sharing divides the key into multiple portions, and each part is known as shared key, and is possessing required number It can restore the key when shared key of amount.
The shared stage: in order to share key, publisher is by constructing different Polynomial generation difference authorized users' Then shared key is sent to each authorized user by designated lane by shared key.
Reconstruction stage: as long as meeting given condition, any subset of these authorized users can be inserted using multinomial Value reconstructs key.
2, Threshold cryptosystem cipher system
In our agreement, encipherment scheme is designed using Threshold key sharing system, the cipher system is by following five Kind algorithm composition:
Key generates: with security parameter k, the quantity n (n >=1) of decryption group, threshold value t (1≤t≤n) and random string X exports public key pk, one group of shared key { y as input1…ynAnd one group of authentication secret v, { v1…vn}。
Encryption: by public key pk, random string x and plaintextAs input, and export ciphertext CT.
It decrypts part: by public key pk, ciphertext CT, index i (1≤i≤n) and corresponding shared key yiAs input, and Export corresponding decryption shares ciP is proved with proving that share decryption is effectivei
Verifying: by ciphertext CT, index i (1≤i≤n), authentication secret v, { v1…vn, decryption shares ciAnd its prove piMake For input.1 is exported if proving effectively, otherwise exports ⊥.
In conjunction with: using any subset of public key pk and effective decryption group t as input, and export in plain text
3, Bloom filter
Bloom filter is a kind of random data storage organization, by one group of Hash function BF (x)=(bh1(x),…,bhk (x)) it forms.Bloom filter in access process for hiding the value of attribute or the partial information of attribute.In this scenario, Bloom filter is used for anonymous storing data file, exports (bh by verifying1(x),…,bhk(x)) whether matched with input x, The label searched is verified.
4, discrete logarithm equation proves
Chaum-Pedersen identification protocol can be used to prove the equation of discrete logarithm.If p, q are two Big primes, and Q | p-1, by GqIt is denoted asQ rank subgroup,For the nonzero integer ring of mould p, g and h are GqTwo generations member.It is not needing In the case where informing specific formula, so that it may prove y ≡ gx(modp) and t ≡ hx(modp) index value x is identical, card Bright work is as follows:
CertifierRandomly choose a value r ∈ Zp, then by U ≡ gr(modp) and V ≡ hr(modp) it is sent to verifying Person
-By random value e ∈ ZpIt sends back
-It calculates z=r+xe mod p and is sent to z
If gz≡Uye(modp) and hz≡Vte(modp),Then receive proof;Otherwise just refusal proves.Its reliability It is the dialog procedure first step having the same of two receiving, honest verifier's Zero Knowledge is to set up, because for appointing Anticipate random value e ∈ ZpWith z ∈ Zp, the array (g of generationzy-e, hzt-e, e, z) and it is reliably that the distribution of value can not be by random value Prediction.
Based on the above pre-knowledge, implementation procedure of the present invention is as follows:
1, system initialization
(1) public key generator selects an order for the group G of prime number p1, G1Generation member g and impact resistant hash function H.
(2) block function is usedThe user's set U for wanting shared owner's significant data is divided by different identity For N number of different group, such as family's group, friend's group, medical worker's group, legal staff's group, it is expressed as U1,…,UNAnd meet U =U1∪…∪UN.That is, by the User ID in user's setiIt is divided intoWhereinIt is defined asIfK ∈ { 1 ..., N }, then user groupAlso referred to as Uk, use therein Amount is nk
(3) data owner is in tk- 1 ZpUpper selection random number skAnd random number polynomialWherein ZpIndicate mould p integer item, every group of UkMiddle ak,0=sk, k=1~N.
2, key generates
IDiIt indicates the user in user's set, passes through block functionIt is divided in a group UkIn, use therein Amount is nk.For mark group UkIn User IDi, need for a group UkIn user renumber, User IDiFor a group UkIn jth A user, then it represents that be IDjk
(1) data owner is group UkIn each User IDjkUse one group of polynomial fk(x) its shared key is calculated yj|k=fk(xjk), whereinIt is and userAssociated common value.
(2) data owner calculates firstThen authentication secret v=g is enabled, is then counted Calculate other authentication secrets:Wherein j=1,2 ..., nk, finally discloseValue.G is G1Known generation member, skFor selected random number, ak,iFor random number polynomial fk(x) known coefficient in.
(3) next, data owner passes through dedicated channel for shared keyIt sends To corresponding authorized user
(4) in User IDjkReceive shared key SKjkLater, the received shared key SK of institute is first verified thatjkWhether have Effect, that is, verifyWherein tk- 1 is highest number,
(5) shared key SK is verifiedjkLater, user is by SKjkAs its shared key.
3, Generating Data File
(1)It is the data to be encrypted, data owner selects random number rk∈Zp(k=1 ..., N) and Stochastic {sk| K ∈ { 1 ..., N } }, data file encryption isG1Indicate close The 1st of text, ciphertext N are denoted as GN, ciphertext N+1 are denoted as C0
(2) information of the owner is expressed as (Valueowner), the label of this document is Tagowner=H (Valueowner)。 Then it is used to retrieve and matched label B Fowner=BF (Tagowner) can be constructed by Bloom filter.
(3) the CP anonymity of its data file encryption is uploaded to Cloud Server by the owner.The document format data of each storage It is as follows:
4, part decipherment algorithm
AkIt is a group UkPermission subset,It is the union of N number of group of N number of permission subset.
(1) authorized user of this N number of permission set calculates the label Tag of the data file of their desired decryptionowner=H (Valueowner), it is then sent to Cloud Server.
(2) Cloud Server receives customer-furnished label TagownerAnd verify BFowner=BF (Tagowner).If full Foot, then send back user for ciphertext CT.
(3) to ciphertext CT has been given, each authorized user decrypts its a part.Authorized user IDjkUse his decryption Key yjkPartially to decryptGenerating a non-interactive type simultaneously proves pjkTo prove CjkAnd vjkIt has been thus lifted to Identical permission.
5, data file is decrypted
Authorized user collects AkIt receives and corresponding data file: G is sent by Cloud Server1,…,GN,C0
(1) these authority sets A is come fromkAuthorized user use authentication secretCheck equationIf non-interactive type proves pjkEffectively, then provide decruption key is honest User
(2) if not having dishonest user in authorized user, these users can restore data
To put it more simply, note
In scheme shown in Fig. 1, in order to ensure the safety of personal data, data owner can oneself specified authorization use Family.In addition, easily managing for effect, management is grouped according to the type of user, to access data under enforcement mechanisms, from And realize the rights management mechanism of dispersion.Further, since the validity and fairness of data, can thoroughly identify any dry The behavior of normal data access is disturbed, to ensure that the stability of system makes its normal operation.
It can be seen that the available sufficient guarantee of the safety and reliability of data file of the present invention.The program is not only Flexibly effectively, and it can be realized Semantic Security characteristic.In addition, the program is realized in the case where not invading honest person's right Identification to fraudster.Compared with existing fraudster's recognition methods such as RS code, the present invention can detecte out each dishonest User.It is at low cost that efficiency analysis shows that the program calculates, and bandwidth availability ratio is low.

Claims (4)

1. a kind of cloud storage secure data sharing method based on Chaum-Perdesen, it is characterised in that:
It will be hidden with the incoherent confidential information of significant data, significant data will be encrypted and stored in cloud;
The type that authorized user is corresponded to significant data, is divided into several groups;
The corresponding one group of secret shadow of every part of significant data, every group of secret shadow are made of the secret shadow of multiple and different owners, Each secret shadow uses the threshold secret sharing method of Shamir, is assigned to corresponding authorized user's group, each to award It weighs user group and specifies a decruption key, the authorized user of each authorized user's group distributes its private according to the decruption key of the group Key, i.e., the sub- code key of this group decruption key could decrypt corresponding secret part of significant data when correctly reconstructing decruption key Volume, so that realizing that mutually supervision is lower between the groups decrypts significant data.
2. the cloud storage secure data sharing method based on Chaum-Perdesen according to claim 1, which is characterized in that The data are Medicare data, the personal information for referring to the owner with the incoherent confidential information of significant data, including Name, age, Work Home, address etc.;The significant data refers to the data directly related with medical insurance of the owner, including Electronic health record, health records, consultation information and financial information, the identity of the authorized user and the type of significant data are corresponding, Including family's group, friend's group, medical worker's group and finance information management group.
3. the cloud storage secure data sharing method based on Chaum-Perdesen according to claim 1, which is characterized in that It is described to be hidden with the incoherent confidential information of significant data by the methods of Bloom filter.
4. the cloud storage secure data sharing method based on Chaum-Perdesen according to claim 1, specific steps are such as Under:
1), system initialization
(1.1) public key generator selects an order for the group G of prime number p1, G1Generation member g, impact resistant hash function be H;
(1.2) block function is usedThe user's set U for wanting shared owner's significant data is divided into N by different identity A different group, is expressed as U1,…,UNAnd meet U=U1∪…∪UN;That is, by the User ID in user's setiIt divides AtWhereinIt is defined asIfThen user GroupReferred to as Uk, number of users therein is nk
(1.3) data owner is in tk- 1 ZpUpper selection random number skAnd random number polynomialWherein ZpIndicate mould p integer item, every group of UkMiddle ak,0=sk, k=1~N;
2), key generates
(2.1)IDj|kIndicate User IDiFor a group UkIn j-th of user, data owner be group a UkIn each User IDj|kMake With one group of polynomial fk(x) its shared key y is calculatedj|k=fk(xj|k), wherein j=1 ..., nk,It is With userAssociated common value;
(2.2) data owner calculates firstThen authentication secret v=g is enabled, is then calculated Other authentication secrets:Wherein j=1,2 ..., nk, finally discloseValue, g G1 Known generation member, skFor selected random number, ak,iFor random number polynomial fk(x) known coefficient in;
(2.3) data owner passes through dedicated channel for shared keyIt is sent to and awards accordingly Weigh user
(2.4) in User IDj|kReceive shared key SKj|kLater, the received shared key SK of institute is first verified thatj|kWhether have Effect, that is, verifyWherein tk- 1 is highest number,
(2.5) shared key SK is verifiedj|kLater, user is by SKj|kAs its shared key;
3), Generating Data File
(3.1)It is the data to be encrypted, data owner selects random number rk∈Zp(k=1 ..., N) and Stochastic { sk| K ∈ { 1 ..., N } }, data file encryption isG1Indicate ciphertext 1st, ciphertext N are denoted as GN, ciphertext N+1 are denoted as C0
(3.2) information of the owner is expressed as (Valueowner), the label of this document is Tagowner=H (Valueowner), it uses To retrieve and matched label i.e. BFowner=BF (Tagowner) constructed by Bloom filter;
(3.3) the CP anonymity of its data file encryption is uploaded to Cloud Server by the owner, and the document format data of each storage is such as Shown in lower:
4), part decipherment algorithm
(4.1)AkIt is a group UkPermission subset,It is the union of N number of group of N number of permission subset, The authorized user of the union calculates the label Tag of its data file for wanting decryptionowner=H (Valueowner), it is subsequently sent to Cloud Server;
(4.2) Cloud Server receives label TagownerAnd verify BFowner=BF (Tagowner), if it is satisfied, then ciphertext CT is sent out Send user back to;
(4.3) to ciphertext CT has been given, each authorized user decrypts its a part, authorized user IDj|kUse its decruption key yj|kPartially to decryptGenerating a non-interactive type simultaneously proves pj|kTo prove Cj|kAnd vj|kIt has been thus lifted to Identical permission;
5), data file is decrypted
(5.1) authorized user collects AkIt receives and corresponding data file: G is sent by Cloud Server1,…,GN,C0;From authorized user Collect AkAuthorized user use authentication secretCheck equationSuch as Fruit non-interactive type proves pj|kEffectively, then that provide decruption key is honest user;
(5.2) if not having dishonest user in authorized user, these users can restore data:
CN201910142859.9A 2019-02-26 2019-02-26 Cloud storage security data sharing method based on Chaum-Pedersen Active CN109858283B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910142859.9A CN109858283B (en) 2019-02-26 2019-02-26 Cloud storage security data sharing method based on Chaum-Pedersen

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910142859.9A CN109858283B (en) 2019-02-26 2019-02-26 Cloud storage security data sharing method based on Chaum-Pedersen

Publications (2)

Publication Number Publication Date
CN109858283A true CN109858283A (en) 2019-06-07
CN109858283B CN109858283B (en) 2022-11-01

Family

ID=66898991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910142859.9A Active CN109858283B (en) 2019-02-26 2019-02-26 Cloud storage security data sharing method based on Chaum-Pedersen

Country Status (1)

Country Link
CN (1) CN109858283B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779609A (en) * 2021-09-22 2021-12-10 北方健康医疗大数据科技有限公司 Data management method and device, electronic equipment and storage medium
CN111161075B (en) * 2019-12-31 2024-04-05 深圳市迅雷网络技术有限公司 Blockchain transaction data proving and supervising method, system and related equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1633077A2 (en) * 2000-03-24 2006-03-08 Dategrity Corporation Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections
US9461821B1 (en) * 2014-06-30 2016-10-04 Emc Corporation System and method for key material protection on devices using a secret sharing scheme
CN106127081A (en) * 2016-07-18 2016-11-16 贵州大学 The open data fault-tolerant method for secure storing that can verify that
CN107241321A (en) * 2017-05-26 2017-10-10 陕西科技大学 A kind of personal medical information method for secret protection
CN107395568A (en) * 2017-06-21 2017-11-24 西安电子科技大学 A kind of cipher text retrieval method of more data owner's certifications
CN109274492A (en) * 2018-09-30 2019-01-25 中国科学技术大学 From the close coupling privacy sharing method of safety

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1633077A2 (en) * 2000-03-24 2006-03-08 Dategrity Corporation Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections
US9461821B1 (en) * 2014-06-30 2016-10-04 Emc Corporation System and method for key material protection on devices using a secret sharing scheme
CN106127081A (en) * 2016-07-18 2016-11-16 贵州大学 The open data fault-tolerant method for secure storing that can verify that
CN107241321A (en) * 2017-05-26 2017-10-10 陕西科技大学 A kind of personal medical information method for secret protection
CN107395568A (en) * 2017-06-21 2017-11-24 西安电子科技大学 A kind of cipher text retrieval method of more data owner's certifications
CN109274492A (en) * 2018-09-30 2019-01-25 中国科学技术大学 From the close coupling privacy sharing method of safety

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
XUEMING WANG等: "Desigh of generalization of threshold sighcryption scheme based on ECC", 《IEEE XPLORE》 *
张恩等: "抗隐蔽敌手的云外包秘密共享方案", 《通信学报》 *
李大伟: "基于身份加密的秘密共享及其应用研究", <中国博士学位论文全文数据库信息科技辑> *
石润华等: "公开可验证的门限秘密共享方案", 《微电子学与计算机》 *
程睿等: "可公开验证的秘密共享方案在自组网中的应用", 《信息工程大学学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111161075B (en) * 2019-12-31 2024-04-05 深圳市迅雷网络技术有限公司 Blockchain transaction data proving and supervising method, system and related equipment
CN113779609A (en) * 2021-09-22 2021-12-10 北方健康医疗大数据科技有限公司 Data management method and device, electronic equipment and storage medium
CN113779609B (en) * 2021-09-22 2024-03-22 北方健康医疗大数据科技有限公司 Data management method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN109858283B (en) 2022-11-01

Similar Documents

Publication Publication Date Title
EP3451578B1 (en) Turn-control rewritable blockchain
KR102669763B1 (en) Systems and methods for communicating, storing and processing data provided by entities over a blockchain network
CN110008746A (en) Medical records storage, shared and safety Claims Resolution model and method based on block chain
CN110299195A (en) The electronic health record shared system and application method with secret protection based on alliance&#39;s chain
JP3791131B2 (en) Electronic ticket system
US8615668B2 (en) Confidential search system and cryptographic processing system
Ying et al. A lightweight policy preserving EHR sharing scheme in the cloud
CN111986755A (en) Data sharing system based on block chain and attribute-based encryption
CN106850656B (en) Multi-user&#39;s file-sharing control method under a kind of cloud environment
Kumar et al. Enhancing security mechanisms for healthcare informatics using ubiquitous cloud
Hupperich et al. Flexible patient-controlled security for electronic health records
Sun et al. Preserving privacy in emergency response based on wireless body sensor networks
Ibrahim et al. A secure framework for sharing electronic health records over clouds
Olakanmi et al. FEACS: A fog enhanced expressible access control scheme with secure services delegation among carers in E-health systems
Sangeetha et al. A secure cloud based Personal Health Record framework for a multi owner environment
CN109858283A (en) A kind of cloud storage secure data sharing method based on Chaum-Perdesen
CA3060710A1 (en) Systems and methods for identity atomization and usage
Yang et al. A privacy‐preserving data transmission scheme based on oblivious transfer and blockchain technology in the smart healthcare
Ali et al. Anonymous aggregate fine-grained cloud data verification system for smart health
Srivastava et al. Attack resistant blockchain-based healthcare record system using modified RSA Algorithm
Omotosho et al. A secure electronic prescription system using steganography with encryption key implementation
Zhang et al. Password-controlled encryption with accountable break-glass access
CN114124392B (en) Data controlled circulation method, system, device and medium supporting access control
Wang et al. A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Abouakil et al. Data models for the pseudonymization of DICOM data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant