Cargando…
Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems
Data sharing is very important for medical researchers to do research on certain diseases in cloud-assisted electronic medical systems. Nonetheless, there are large amounts of duplicate data in shared electronic medical records, which incurs redundant storage. In addition, data sharing of electronic...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9614769/ https://www.ncbi.nlm.nih.gov/pubmed/36320212 http://dx.doi.org/10.1007/s10586-022-03785-y |
Sumario: | Data sharing is very important for medical researchers to do research on certain diseases in cloud-assisted electronic medical systems. Nonetheless, there are large amounts of duplicate data in shared electronic medical records, which incurs redundant storage. In addition, data sharing of electronic medical records might expose the sensitive information of patients. In order to address above problems, we propose a secure data sharing scheme with data deduplication and sensitive information hiding in cloud-assisted electronic medical systems in this paper. In order to protect the sensitive information privacy and enhance the deduplication efficiency, we replace the patient’s sensitive information of electronic medical records by wildcards before encrypting the whole electronic medical records. The authorized researcher can decrypt and obtain the electronic medical records under the condition that the sensitive information of shared electronic medical records is hidden. Moreover, we clarify the diagnose information of the electronic medical records into different types according to the duplicate ratio. The authorized researchers can selectively download data according to the duplicate ratio of diagnostic information. Our proposed scheme can resist brute-force attacks and single-point-of-failure attack. The experimental results show our proposed scheme is more efficient than the existing schemes. |
---|