Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing

  • PDF / 740,473 Bytes
  • 16 Pages / 439.37 x 666.142 pts Page_size
  • 10 Downloads / 241 Views

DOWNLOAD

REPORT


Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing Yu-lei Zhang 1 & Long Wen 1

2

& Yong-jie Zhang & Cai-fen Wang

3

Received: 16 December 2019 / Revised: 1 June 2020 / Accepted: 11 June 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

In the cloud applications of medical data based on blockchain, doctors and managers usually want to obtain image data shared by other healthcare institutions. To ensure the privacy and workability of the image data, it is necessary to encrypt plain image data, retrieve cypher data and verify the authenticity of the data. Public key authenticated searchable encryption (PAEKS) is an effective mechanism to realize the privacy and workability properties of data. However, the existing PAEKS schemes are unable to realize the identity privacy protection of the data owner, and the traditional blockchain system (such as the Bitcoin) cannot achieve these goals directly. To overcome the above drawback, we first present a deniably authenticated searchable encryption scheme for medical image data sharing (DASES) that is based on blockchain and deniably authenticated encryption technology. The DASES takes advantage of blockchain technology to ensure the non-tampered, unforgettable and traceability of the image data, and it also avoids the limitation of the blockchain’s own storage and computing power. The DASES can not only withstand inside keyword guessing attack (IKGA) but also provide effective privacy protection and verify the authenticity of medical image data. Hence, it can better protect the privacy of data senders and provide stronger security. Next, we prove that the DASES satisfies the indistinguishability of the ciphertext and trapdoor. It is regrettable that the DASES is less efficient than related schemes in the literature, but its greatest strength is its ability to provide better identity privacy protection and stronger security. Keywords Blockchain . Deniably authenticated encryption . Identity privacy . Searchable encryption . Medical image

* Yu-lei Zhang [email protected] Long Wen [email protected] Extended author information available on the last page of the article

Multimedia Tools and Applications

1 Introduction In applying medical image data sharing, doctors usually require some concrete data about sufferers to determine the appropriate treatment [3]. Therefore, searching for specific medical image data is an important component module of smart medical. When doctors search for concrete symptoms, they can hunt for the relevant medical image data and download it. Doctors are commonly demanded to verify data’s validity. However, patients also want to protect their privacy. Therefore, it is important and necessary that research institution explains the authenticity and dependability of the data for others without allowing them to recognize the origin of the medical image data. Usually, researchers use content based image retrieval (CBIR) [14], which automatically extracts the related in