• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Lightweight,Searchable,and Controllable EMR Sharing Scheme

    2024-05-25 14:42:58XiaohuiYangandPeiyinZhao
    Computers Materials&Continua 2024年4期

    Xiaohui Yang and Peiyin Zhao

    School of Cyber Security and Computer,Hebei University,Baoding,071000,China

    ABSTRACT Electronic medical records(EMR)facilitate the sharing of medical data,but existing sharing schemes suffer from privacy leakage and inefficiency.This article proposes a lightweight,searchable,and controllable EMR sharing scheme,which employs a large attribute domain and a linear secret sharing structure(LSSS),the computational overhead of encryption and decryption reaches a lightweight constant level,and supports keyword search and policy hiding,which improves the high efficiency of medical data sharing.The dynamic accumulator technology is utilized to enable data owners to flexibly authorize or revoke the access rights of data visitors to the data to achieve controllability of the data.Meanwhile,the data is re-encrypted by Intel Software Guard Extensions(SGX)technology to realize resistance to offline dictionary guessing attacks.In addition,blockchain technology is utilized to achieve credible accountability for abnormal behaviors in the sharing process.The experiments reflect the obvious advantages of the scheme in terms of encryption and decryption computation overhead and storage overhead,and theoretically prove the security and controllability in the sharing process,providing a feasible solution for the safe and efficient sharing of EMR.

    KEYWORDS Lightweight;keyword search;large attribute domain;controllability;blockchain

    1 Introduction

    In today’s information age,data is considered an important asset[1].However,in the healthcare sector,the secure and efficient sharing of electronic medical records has always been a challenge.Since 2020,the cost of healthcare data breaches has increased by 53.3%,and for the 13th consecutive year,the healthcare industry has reported the most costly data breaches with an average loss of $10.93 million[2].Healthcare data contains a large amount of private information such as patients’identity and medical history,which can pose serious security risks to patients if compromised [3].However,electronic healthcare data sharing has become a key trend in healthcare.Most patients are willing to share their personal medical data under the premise of ensuring patient privacy and data security[4].The Healthcare Medical Data Compliance Circulation Standard provides a regulatory framework for healthcare data circulation[5],which is a major advancement in healthcare data circulation.

    Medical data includes sensitive data such as medical history and personal health information.Once illegally accessed,it not only violates personal privacy,but also may lead to serious consequences such as identity theft.At the same time,the rights and interests of data owners cannot be safeguarded due to the lack of sufficient trust between data owners and data visitors.Therefore,it is very important to ensure the rights and interests of the data owner and privacy,while at the same time achieve efficient access to e-medical data by data visitors.On the basis of CP-ABE,Zheng et al.[6] proposed the ciphertext policy-based keyword searchable attribute-based encryption (CP-ABKS) scheme,which allows to retrieve the encrypted documents through keyword search while maintaining fine-grained access control,but the use of a tree structure is less efficient and cannot achieve the resistance to the keyword guessing attack,and also the data owner’s controllability over the data,thus effectively guaranteeing the data owner’s rights and privacy while ensuring the data visitor’s efficient access to the electronic medical data.Zhang et al.[7] proposed a partial policy hiding scheme against attribute value guessing attack using interactive online privacy protection test,which can resist offline dictionary guessing attack,but with low efficiency and no controllability of data by data owner.Li et al.[8]realized data sharing based on proxy re-encryption,and at the same time,realized a certain controllability of data by data owner.The data sharing is based on proxy re-encryption technique,while the data owner has some control over the data,and the blockchain is used to verify the user privileges and record the request content to achieve a certain degree of regulatory control,but the scheme is not able to resist the offline dictionary guessing attack,and the sharing efficiency also needs to be improved.In order to promote efficient and secure sharing of healthcare data,new technologies and strategies must be used to address these issues.

    To address the above problems,this paper proposes a lightweight,searchable,and controllable EMR sharing scheme,which utilizes a large attribute domain and a linear secret sharing structure to improve the flexibility and efficiency of medical data sharing,reduces the encryption and decryption overhead of the medical data during the sharing process,and decrypts the ciphertext with a constant level of computation.Using Intel SGX technology,a secure container Enclave is opened in the system to re-encrypt the data and change the structure of the data,thus realizing the resistance to offline dictionary guessing attacks and avoiding the interaction of data visitors in the server during the search process.Adopting dynamic accumulator technology,the data owner can flexibly manage authorized users,including the update and revocation of privileges,etc.,which enhances the owner’s controllable degree of its own data.The summary and Hash of the access rows of the data visitors are uploaded to the blockchain,and by using the characteristics of blockchain such as tampering,the regulation can trace the request process of the data,and carry out credible judgments and pursuing responsibilities when there is anomalous behavior.The main contributions of this paper are summarized as follows.

    The solution adopts the LSSS structure and supports large attribute domains,which further improves the flexibility and efficiency of the existing solution and can be adapted to devices with limited computing resources.

    The application of Intel SGX further guarantees the security of the data sharing process.

    The combination of dynamic accumulator technology and blockchain technology further increases the rights and interests of data owners in the sharing process.

    The paper is organized as follows.The second part presents the related research work.The third part provides the basics of the theoretical model.The fourth part first introduces the design of the scheme and details the key processes such as algorithms in the scheme.The fifth part is the security analysis of the scheme.The sixth part is the experimental verification and analysis.Finally,the seventh part summarizes and discusses.

    2 Related Work

    In recent years,the emergence of emerging technologies such as Deep Learning [9],Edge Computing[10]and Knowledge Graphs[11]has contributed significantly to the research on efficient sharing of data.In sensitive domains such as electronic medical record sharing,fine-grained data access control mechanisms are required.However,some traditional searchable encryption(SE)schemes do not support fine-grained access control[12].In this context,Attribute-Based Encryption(ABE)[13]has been proposed as an effective solution to achieve finer-grained access control.Sun et al.[14]extended this concept and implemented a verifiable CP-ABKS scheme in a multiuser environment,which supports user revocation and is resistant to keyword guessing Attacks.Access policies may reveal sensitive information about the data owner,which makes it crucial to hide the access policies,but none of the above schemes support policy hiding.Nishide et al.[15]proposed a wildcard-based scheme for policy hiding,but it only supports the“and gate”structure,which makes it more demanding and less flexible in terms of computing resources.However,only the“and gate”structure is supported,which makes it more demanding on computational resources and less flexible.In order to overcome these limitations,Lai et al.[16] proposed a more flexible partial policy hiding scheme based on ensemble groups using Linear Secret Sharing Scheme(LSSS),but this scheme also does not support keyword search.

    Qiu et al.[17] proposed a new CP-ABKS scheme that supports policy hiding with resistance to keyword guessing attacks and effectively restricts the possibility of unauthorized users to perform searches,but there is a lack of research on data encryption.Based on this,Wang et al.[18]proposed a data owner attribute-based encryption scheme with policy hiding that can be searched and revoked to enable data sharing by multiple owners.Miao et al.[19] proposed a keyword search scheme with privacy preservation and support for multi-owner cooperation that supports policy hiding and user tracking.However,schemes [17–19] are based on the partial policy hiding implemented in Nishide et al.’s[15]scheme,with low flexibility and scalability of access control,and none of them can resist offline dictionary guessing attacks.Ma et al.[20]proposed an innovative EMR access control model and fine-grained data sharing mechanism for resource-constrained mobile devices,and addressed challenges of data privacy protection and challenges such as computational efficiency optimization,but fails to achieve controllability of data by the data owner.The DNACDS scheme proposed by Singh et al.[21] and the LBP-RDH technique proposed by Sahu et al.[22] also provide some new ideas for healthcare data security and sharing.

    While improving the efficiency of healthcare data access control,the controllability of the data flow of the data owner’s data during the sharing process is equally important.Since the emergence of Bitcoin in 2009,its underlying blockchain technology has gradually received attention from the research field of healthcare data sharing controllability due to its characteristics.Xia et al.[23]proposed MeDShare,a healthcare data management system in a trustless environment,where data manipulation behaviors are logged and user permissions are managed,but there is a high overhead in verifying user permissions.Gao et al.[24]designed a blockchain-based medical data sharing scheme using searchable encryption and secret sharing techniques.The scheme takes into account the problem that cloud storage servers are not fully trusted and uses secret sharing techniques to support sharing by multiple users,but the interaction process of the scheme is relatively complex and the system coupling is relatively high.Sun et al.[25]proposed a blockchain-and smart contract technology based distributed electronic searchable scheme for medical data,which achieves decentralization of data storage and fine-grained control of data access,and at the same time adopts an attribute-based encryption scheme to ensure data privacy,but the system efficiency needs to be further improved.Wu et al.[26]proposed a blockchain-based smart healthcare system,which has fine-grained privacy protection,and can reliably exchange and share data among different users but cannot resist offline dictionary guessing attacks.

    Zhou et al.[27] designed a sharing scheme for healthcare data by combining attribute-based encryption and blockchain technology from access control in the time dimension.Although a regulatory center is set up to manage the user’s identity,there is little flexibility to restrict data sharing from the time dimension.Chelladurai et al.[28]used blockchain smart contracts to provide a secure,efficient and seamless solution to support healthcare information exchange and peer-to-peer contracts with cryptographic hash functions to ensure high security and integrity,but the user cannot achieve effective data control.Lin et al.[29] proposed the UDVSP scheme and the EMRChain system to achieve efficient and secure blockchain-based EMR sharing with bilinear unpaired and anti-malicious propagation,which was demonstrated through a comprehensive performance evaluation shows that these schemes are feasible,but cannot resist offline dictionary guessing attacks.Gao et al.[30]proposed a blockchain-based searchable encryption scheme that implements fine-grained access control and EHR sharing on the cloud,ensuring data integrity and fairness of transactions,while resisting adaptive keyword selection attacks,but with poor data controllability for the data owner.

    Based on the above statement,the current scheme does not simultaneously weigh the relationship between efficient encryption and decryption of medical data and sharing and the effective controllability of data owners’data,therefore,in this paper,we propose a lightweight searchable and controllable electronic medical record sharing scheme,which adopts the large attribute domain,the LSSS structure,and the Intel SGX technology to realize the function of keyword search,policy hiding,and offline dictionary guessing attack.The keyword search,strategy hiding and offline dictionary guessing attack functions,which improve the sharing efficiency and ensure the security of the data at the same time;through the combination of dynamic accumulator technology and blockchain technology,it is to realize the controllability of the data by the data owner and the credible judgment and accountability of the regulator,which fully protects the rights and interests of the data owner.

    3 Preliminaries

    3.1 Composite Order Bilinear Group

    Apply a bilinear group of composite orderQ=p1p2p3,wherep1,p2andp3are three different prime numbers.GandGTare two multiplicative cyclic groups of orderQ=p1p2p3.is a subgroup ofGwith orderpi,and(i/=j)is a subgroup ofGwith orderpipj.The bilinear mappinge:G×G→GTsatisfies the following properties:

    1) Bilinearity:for anyu,v∈Ganda,b∈Zp,hase=e(u,v)ab.

    2) Non-degeneracy:there existsg∈Gsuch that the order ofe(g,g)inGTisQ.

    3) Computability:for anyu,v∈G,there exists an efficient algorithm to computee(u,v).

    4) Orthogonality of subgroups:for ?gi∈and ?gj∈(i/=j),hase=1.

    3.2 Access Structure

    In order to achieve effective control of the data owner over the data visitor,it is necessary to customize the access authorization set,which is satisfied to continue access,otherwise access is denied.Let {P1,P2,···,Pn} be a set of entities comprisingnparticipants.For setA?,if ?B,CwhereB∈AandB?C,hasC∈A,thenAis said to be monotone.IfAis a non-empty subset of{P1,P2,···,Pn},that is,A?{?},thenAis considered an access structure.All sets included inAare termed as authorized sets,and those not included inAare termed as non-authorized sets.

    3.3 Intel SGX

    Intel SGX is an extension of the existing Intel architecture,comprising a new set of instruction sets and memory access mechanisms [31] that allow applications to create an isolated execution environment known as an Enclave.An Enclave serves as a trusted and secure entity for storing data and executing code.It possesses three key security features:Isolation,sealing,and attestation[32].The feature of isolation restricts access to a protected area of memory hardware to only specific Enclaves.The encryption is performed using a sealing key that is private to a specific Enclave,and no process other than an exact replica of the Enclave is able to decrypt or modify it.Attestation allows verifiers to authenticate that the code is running securely within an Enclave and has not been tampered with.SGX offers two types of attestation:Local and remote[33].Local attestation is used for authentication between two Enclaves on the same platform,where they can derive a shared key using a root sealing key shared between them.Remote attestation enables an Enclave to generate reports that can be verified by any remote entity.

    4 Scheme Design

    4.1 Scheme Overview

    The lightweight searchable and controllable electronic medical record sharing scheme(EMR_LSC SS) designed in this paper is shown in Fig.1.The system mainly includes six participating entities:Cloud Server (CS),Regulatory and Authorization Center (RAC),Data Owner (DO),Data Visitor(DV),Blockchain(BC),and Enclave.

    4.2 Specific Algorithm Processes

    The scheme presented in this article primarily comprises algorithms for System initialization,Key generation,Accumulator initialization,Encryption,Re-encryption,Search request,Authorization search,Search token generation,Search and Decryption.The symbol description is shown in Table 1 and specific algorithmic processes are as follows.

    Table 1: Symbol description table

    1.Key generation algorithm.This algorithm is executed by RAC.

    2.Accumulator initialization algorithm.This algorithm is executed by DO.

    3.Encryption algorithm.This algorithm is executed by DO.

    4.Re-Encryption algorithm.This algorithm is executed by Enclave.

    5.Search request algorithm.This algorithm is executed by DV.

    6.Authorization search algorithm.This algorithm is executed by DO.

    7.Search token generation algorithm.This algorithm is executed by DV.

    8.Search algorithm.This algorithm is executed by CS.

    9.Decryption algorithm.This algorithm is executed by DV.

    5 Security Analysis of the Scheme

    The scheme has the ability to resist offline dictionary guessing attacks and is controllable by the data owner.This section proves its security.

    5.1 Proof of Security against Offline Dictionary Guessing Attacks

    Offline Dictionary Guessing Attacks generally target keywords or attribute values.In this paper’s solution,the keywords and attribute values are included in the keyword index and the search tokens.Therefore,the following will provide a security analysis for resistance to Offline Dictionary Guessing Attacks from the perspectives of the keyword index and search tokens.In this context,the CS acts as the attacker,with the attributes{ci,vi}and keywordsKwiall being elements from the offline dictionary.

    Assumption 1:CDH(Computational Diffie-Hellman problem)Assumption

    Let us presume a multiplicative cyclic groupGwith its order being a prime numberp,andgbeing a generator of the cyclic groupG.Calculation parametersa,b∈Zpare selected randomly.The CDH assumption can be understood as:It is quite difficult to solvegabthroughgaandgb.

    Theorem 1:If the CDH assumption holds,then the scheme proposed in this paper can resist offline dictionary guessing attacks based on keywords and indices.

    Theorem 2:The scheme proposed in this paper can resist offline dictionary attacks directed at search tokens.

    According to the above proof it can be seen that the attacker finds a polynomial in polynomial time and puts the keywords and attribute values from the offline dictionary into the discriminant in order to check whether the discriminant is valid or not,and it turns out that the discriminant is invalid,so this paper’s scheme is resistant to offline dictionary guessing attack security.

    5.2 Proof of Security for Data Owner’s Control over Their Data

    Assumption 2:Given the fulfillment of the following conditions,the data owner has controllability over their own data,that is,the scheme proposed in this paper offers data controllability security.

    In the aforementioned equation,f(μ)is a negligible function,implying that the probability of DV not receiving authorization from DO is approaching 1.

    Theorem 3:During the process in which the data visitor requests the data owner for data sharing,only those data visitors authorized by the data owner can obtain the corresponding data.That is,the data owner has controllability over personal data.

    Based on the above proof,it can be seen that DO can control the flow of its own data,i.e.,it can flexibly authorize data access to other DVs or revoke the authorization to a certain DV to ensure the controllability of its own data.

    6 Performance Analysis of the Scheme

    6.1 Experimental Environment

    In order to gain a more intuitive understanding of the performance of the proposed scheme,this simulation experiment uses Java language and calls a third-party Java pairing based encryption(JPBC)library to simulate some of the algorithms in this scheme.The experimental environment configuration is shown in Table 2.

    Table 2: Experimental environment configuration

    In this paper,an extension of the Type A elliptic curve characterized by the equationy2=x3+xis employed for simulative experiments.The encrypted Electronic Medical Record dataset utilized is the COVID-19 Dataset [34],which is provided by the Mexican government and comprises a vast amount of anonymized patient-related information,including preexisting conditions.The original dataset consists of 21 unique features and 1,048,576 unique patients.During simulation experiments,the range of attribute numbersnand the number of rows in the matrixIwere both set within the interval[0,50],with the number of candidate values per attributeniset as 5.

    6.2 Function Analysis

    This section compares the seven functions of keyword search and large attribute domains,resistance to offline dictionary guessing attacks,constant decryption overhead,access structure,controllability,and trusted accountability with the schemes of Miao et al.[19],Zhang et al.[7],and Gao et al.[30].The comparison results are shown in Table 3.

    Table 3: Function comparison table

    The comparative results presented in the table above allow for the following conclusions.Firstly,the scheme by Miao solely supports keyword search functionality,with an access structure that employs an AND-gate paradigm.Notably,the decryption overhead in their scheme is closely linked to the count of data owners and collaborating parties,which makes it impossible to achieve a constant decryption cost.Secondly,Zhang,despite supporting a vast attribute space and the incorporation of a LSSS structure,and endowing the capability to withstand offline dictionary guessing attacks,exhibit a decryption overhead similar to that of Miao.This cost is not constant either but varies with the number of user attributes.Lastly,Gao have accomplished fine-grained access control and sharing of EMR in the cloud,albeit lacking in mechanisms to counteract offline dictionary attacks and in providing data owners with the power of control.

    This study takes into consideration the advantages of the aforementioned schemes and incorporates technologies such as dynamic accumulators and blockchain.By utilizing these technologies,ensure controllability by data owners over data access and accountable trustworthiness,all the while fulfilling the requirement for low computational resource overhead.Compared to the previous schemes,the proposal in this paper exhibits significant merits.

    6.3 Computational Overhead

    Drawing on the comparative experiments of Miao and Zhang,this section will evaluate the computational cost of some algorithm processes in this paper through theoretical and simulation experiments.By conducting 500 tests and taking the average,the specific unit time results are shown in Table 4.

    Table 4: Computational cost per unit for common cryptographic algorithms

    1)The computational overheads of the proposed scheme in comparison to other schemes during system initialization,key generation,encryption,and shared decryption phases are delineated in Table 5 below.Within this context,nidenotes the number of candidates per attribute,nrepresents the number of attributes,Icorresponds to the number of rows in the access matrix,and d signifies the number of collaborators of the data owner.During the system initialization phase,the computational overhead for Miao is related to both the number of system attributesnand the number of candidate values per attributeni.In contrast,the proposed scheme in this paper,akin to that of Zhang,is predicated upon a large attribute space,hence the computation overhead remains a constant at a constant-time complexity,which is significantly less than that of Miao.

    Table 5: Computational overhead comparison

    Moreover,the computational overhead of the scheme presented in this paper is also marginally lower than that of Zhang.In the key generation phase,the computational overhead of our scheme is reduced by at leastnE1compared to other benchmark schemes.The encryption phase of the scheme under consideration includes both data and index encryption.The computational overhead of Miao is contingent upon the number of collaboratorsdof the data owner,which diverges from the focus of our scheme.Relative to Zhang,the encryption cost of our scheme is approximately 2IE1lower.During the search token generation stage,the computational overhead of our approach is comparable to that of other schemes.

    Owing to the adoption of LSSS structure within the scheme proposed in this article,the reconstruction of the secret values entails exponential operations,thus rendering the computational overhead during the search phase of our scheme relatively higher compared to that of Zhang.Nevertheless,the computational overhead ofETis marginal;therefore,the additional overhead introduced in the search phase is deemed acceptable.Ultimately,in the decryption phase,the computational cost of the scheme by Zhang.is contingent upon the number of user attributesn,whereas the overhead of the scheme elucidated in this work is fixed at a constant-time complexity,which confers a considerable advantage.

    The scheme from Miao involves the number of data owner’s collaboratorsdduring the encryption,key generation,and decryption phases.However,this variable is not included in the scheme presented in this paper and that of Zhang For ease of comparison between the schemes,d=1,and then a comparison is performed.

    The temporal overhead associated with system initialization is depicted in Fig.2.During the system initialization phase,the time overhead of the scheme proposed by Miao exhibits a linear growth trend with respect to the number of attributes m.In contrast,the time overhead for the scheme presented in this paper as well as that by Zhang remains constant,with notably lower expenses.

    The encryption time overhead is illustrated in Fig.3.During the encryption phase,the time overhead for the schemes proposed by Miao and Zhang both display an exponential growth as a function of the increase in the number of rows I in the sharing matrix.Although the time overhead for the scheme presented in this paper also rises with an increase in the number of rows I,under the stipulated assumptions,the rate of increase for this paper’s scheme is substantially slower than that of Zhang,and is only slightly higher than that of Miao.Furthermore,considering that the cooperating number of data owners d is a relatively large value,and not merelyd=1,in practical scenarios,the growth rate of Miao would be much faster than that of the scheme proposed in this paper.

    Figure 2: System initialization time overhead

    Figure 3: Encryption time overhead

    The temporal overhead of the key generation phase is depicted in Fig.4.Although the scheme in this paper grows linearly with the schemes of Miao and Zhang,the growth rate is significantly lower than that of Miao and Zhang.

    The decryption time overhead is illustrated in Fig.5.The program of Miao has a significantly higher growth rate than the program in this paper.Although the time overhead for Zhang is a relatively small constant when the variable d is presumed to be a constant value of one,in practical scenarios,d is often significantly greater than this value.In contrast,the decryption time overhead of the scheme presented within this paper remains constant and invariant.Consequently,in comparison,the computation during this phase is more efficient in the approach proposed by this study.

    Figure 4: Key generation time overhead

    Figure 5: Decryption time overhead

    As discerned from Table 6.During the system initialization phase,when n=50,the time overhead for the scheme by Miao amounts to 2801.6 ms,for Zhang,it is 40.7 ms,whereas for the scheme proposed in this paper it accounts for 30.9 ms.Consequently,the scheme proposed in this paper demonstrates a significant advantage during the system initialization stage.In the key generation phase,the scheme proposed by Miao incurs a time expense of 1179.5 ms,while that of Zhang amounts to 1173.5 ms,with both exhibiting comparable temporal overheads.In contrast,the scheme presented in this paper demonstrates a significantly reduced time consumption of 624.1 ms,markedly outperforming the approaches of Miao and Zhang.In the encryption stage,when I=50,the time overhead for the scheme proposed in this paper is 1605.2 ms,for Miao it is 1198.7 ms,and for the scheme of Zhang it is 2878.9 ms.In actual scenarios,the scheme presented in this paper holds a distinct advantage in terms of time overhead.In the decryption stage,the time overhead associated with Zhang exhibits a noticeable increase with the addition of attributes.Under the assumption of specific conditions,the time overhead for the scheme by Miao is 32.1 ms,while that for Zhang and colleagues’scheme is 698.7 ms,and the approach introduced in this article incurs a time expense of 38.1 ms,has a clear advantage.

    Table 6: Stage time cost

    In terms of the search token generation and search time overhead,a comparison is drawn between the scheme presented in this paper and that of Miao,as the scheme by Zhang does not incorporate these two stages.The temporal overhead during the search phase is comparable between the two approaches;however,in the phase of search token generation,the scheme of Miao almost doubles the time expense of the scheme proposed in this article.Therefore,the approach delineated herein proves to be more efficient in both of these stages.

    In the stages of re-encryption,accumulator initialization,search requests,and authorization requests,the scheme proposed in this paper adds several functionalities compared to the schemes by Miao and Zhang.Through logical analysis and simulation experiments,these additional functionalities are deemed to be within a reasonable range.

    6.4 Storage Overhead

    This section will analyze the partial overhead associated with the proposed scheme in the context of non-blockchain storage.Herein,|G1|denotes the size of elements in the groupG1,and similarly,|G2|,|GT|andrepresent the sizes of elements in the groupsG2,GTandZp,respectively.Under the elliptic curve defined by the equationy2=x3+x,it holds that |G1|=|G2|=|GT|.Due to functional discrepancies between the scheme introduced in this paper and those by Miao and Zhang,a comparative assessment of storage overhead is limited to five key aspects:System public keys,system master keys,private keys,search tokens,and encrypted indexes—specifically,ciphertexts associated with indexes.The outcomes are tabulated in Table 7.

    Table 7: Storage overhead

    Lastly,for the storage of ciphertexts and indexes,the proposed scheme’s overhead is(2I+4)|G1|,whereas the overhead for both the other schemes surpasses that of the scheme detailed in this document.A theoretical analysis and simulation experiments were conducted on the other functional modules of the proposed scheme for their storage overhead,and the results indicate that the overhead is also within a reasonable range.

    7 Summary

    The current work introduces a lightweight,searchable,and controllable EMR sharing scheme.The proposed framework integrates keyword search with policy hiding,employing large attribute domains and a linear key-sharing structure to enhance the scalability and flexibility of access control.Within this scheme,Intel SGX technology is utilized to re-encrypt data,effectively thwarting offline dictionary guessing attacks and reducing decryption computational overhead to a constant level,catering to users with limited computing resources.To precisely manage data access,the scheme implements dynamic accumulator technology,enabling data owners to grant or revoke access permissions to data requesters flexibly.Additionally,the generation of data requester access logs and the uploading of corresponding hash values to the blockchain efficiently prevent denial and tampering of data.Furthermore,the inclusion of regulatory bodies to evaluate and hold accountable data access requests further elevates the system’s trustworthiness and security.

    Through simulation experiments,the feasibility and superiority of the proposed strategy have been confirmed.Relative to existing solutions,the presented scheme exhibits significant advantages.However,the implementation of the current study has been confined to theoretical simulation due to resource constraints.Consequently,future research endeavors should focus on deploying the proposed strategy within real-world healthcare settings to further validate its effectiveness and practicality.

    Acknowledgement:This study was supported by the Natural Science Foundation of Hebei Province,China,under Project F2021201052.I would like to express my heartfelt gratitude to Professor Xiaohui Yang for his valuable guidance and support throughout this research.I also want to thank all the classmates who provided valuable suggestions for the experiments.Lastly,I am grateful to this esteemed journal for providing an opportunity for further learning.

    Funding Statement:Yang’s work was supported by the Natural Science Foundation of Hebei Province under Grant Number F2021201052.

    Author Contributions:The authors confirm contribution to the paper as follows: Study conception and design:Xiaohui Yang,Peiyin Zhao;data collection:Peiyin Zhao;analysis and interpretation of results:Xiaohui Yang,Peiyin Zhao;draft manuscript preparation:Peiyin Zhao.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The data that support the findings of this study are available from the corresponding author upon reasonable request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    天堂俺去俺来也www色官网| 久久青草综合色| 性少妇av在线| 国产一区二区三区在线臀色熟女 | 男女下面插进去视频免费观看| 两个人免费观看高清视频| 高清av免费在线| 精品国产一区二区久久| 老司机午夜十八禁免费视频| 黄色片一级片一级黄色片| 日本wwww免费看| 99久久精品国产亚洲精品| 菩萨蛮人人尽说江南好唐韦庄| 18禁黄网站禁片午夜丰满| 国产一区二区在线观看av| 狂野欧美激情性xxxx| 午夜激情久久久久久久| 成人影院久久| 久久青草综合色| 国产在视频线精品| 变态另类成人亚洲欧美熟女 | 菩萨蛮人人尽说江南好唐韦庄| 亚洲精品av麻豆狂野| 亚洲欧美精品综合一区二区三区| 久久狼人影院| cao死你这个sao货| 欧美另类亚洲清纯唯美| 亚洲一区中文字幕在线| 久久国产精品男人的天堂亚洲| 一个人免费在线观看的高清视频| 成年人黄色毛片网站| 伦理电影免费视频| 亚洲欧美日韩另类电影网站| 少妇被粗大的猛进出69影院| 国产精品 国内视频| 欧美另类亚洲清纯唯美| 黄色视频在线播放观看不卡| avwww免费| 亚洲七黄色美女视频| 首页视频小说图片口味搜索| 黑人操中国人逼视频| 老熟女久久久| 国产精品自产拍在线观看55亚洲 | 99久久99久久久精品蜜桃| 欧美日韩亚洲高清精品| 国产欧美亚洲国产| 在线观看免费午夜福利视频| 99国产精品99久久久久| 男人舔女人的私密视频| 久久久国产精品麻豆| 一进一出抽搐动态| 一区二区三区国产精品乱码| 亚洲伊人色综图| 亚洲av电影在线进入| 国产成人av教育| 午夜福利视频精品| 精品亚洲乱码少妇综合久久| 国产精品自产拍在线观看55亚洲 | 亚洲自偷自拍图片 自拍| 男女午夜视频在线观看| 国产亚洲精品久久久久5区| e午夜精品久久久久久久| 精品卡一卡二卡四卡免费| 丝瓜视频免费看黄片| 色94色欧美一区二区| 国产极品粉嫩免费观看在线| 亚洲中文日韩欧美视频| 国产在线一区二区三区精| 国产一区二区激情短视频| 精品国产乱码久久久久久小说| 久久国产亚洲av麻豆专区| 久久久久久久国产电影| 人人妻人人澡人人爽人人夜夜| 国产成人一区二区三区免费视频网站| 亚洲欧美一区二区三区久久| 丝袜喷水一区| 男女下面插进去视频免费观看| 亚洲精品国产一区二区精华液| 757午夜福利合集在线观看| 日韩视频在线欧美| 欧美精品一区二区大全| 黄色丝袜av网址大全| 亚洲中文字幕日韩| 91精品三级在线观看| 69精品国产乱码久久久| 精品高清国产在线一区| 91成人精品电影| 国产伦人伦偷精品视频| 美女扒开内裤让男人捅视频| 在线观看66精品国产| 91麻豆精品激情在线观看国产 | 最近最新中文字幕大全免费视频| 亚洲国产中文字幕在线视频| 女同久久另类99精品国产91| 91精品三级在线观看| 操出白浆在线播放| 国产在视频线精品| 一区二区日韩欧美中文字幕| 一区二区三区精品91| 淫妇啪啪啪对白视频| 丝袜在线中文字幕| 成人免费观看视频高清| 一本—道久久a久久精品蜜桃钙片| 不卡av一区二区三区| avwww免费| 国产成人影院久久av| 久久人人爽av亚洲精品天堂| 午夜视频精品福利| 成在线人永久免费视频| 大码成人一级视频| 麻豆乱淫一区二区| 国产在线视频一区二区| 日本撒尿小便嘘嘘汇集6| 一本大道久久a久久精品| av在线播放免费不卡| 中国美女看黄片| 我的亚洲天堂| www.自偷自拍.com| 狠狠狠狠99中文字幕| 亚洲国产中文字幕在线视频| 国产一区二区三区视频了| 国产免费现黄频在线看| 91麻豆av在线| 一级黄色大片毛片| 一二三四社区在线视频社区8| 在线观看免费午夜福利视频| 欧美人与性动交α欧美软件| 久久精品国产亚洲av香蕉五月 | 国产精品一区二区免费欧美| 18禁观看日本| 国产亚洲精品久久久久5区| 国产激情久久老熟女| 人人妻人人澡人人爽人人夜夜| 亚洲成a人片在线一区二区| av不卡在线播放| 久热这里只有精品99| 欧美乱妇无乱码| 久久青草综合色| 极品少妇高潮喷水抽搐| 人成视频在线观看免费观看| 国产一区二区 视频在线| 三上悠亚av全集在线观看| 黑丝袜美女国产一区| 国产单亲对白刺激| 一级黄色大片毛片| 国产精品.久久久| 首页视频小说图片口味搜索| 亚洲精品成人av观看孕妇| 国产精品二区激情视频| 老司机午夜十八禁免费视频| 国产精品98久久久久久宅男小说| 亚洲精品粉嫩美女一区| 狂野欧美激情性xxxx| 久久国产精品影院| 女人久久www免费人成看片| 成人国产av品久久久| 51午夜福利影视在线观看| 国产精品欧美亚洲77777| 999久久久精品免费观看国产| 久久久国产精品麻豆| 色综合欧美亚洲国产小说| 又紧又爽又黄一区二区| 五月开心婷婷网| 可以免费在线观看a视频的电影网站| 九色亚洲精品在线播放| 99在线人妻在线中文字幕 | 精品久久久精品久久久| 午夜福利乱码中文字幕| 久久久国产成人免费| 久久精品国产综合久久久| 精品国产一区二区三区四区第35| 如日韩欧美国产精品一区二区三区| 精品高清国产在线一区| 国产淫语在线视频| 亚洲天堂av无毛| 午夜日韩欧美国产| 久热这里只有精品99| 99精品久久久久人妻精品| 亚洲自偷自拍图片 自拍| 91麻豆精品激情在线观看国产 | 成人手机av| 丝袜美足系列| 国产高清激情床上av| 麻豆国产av国片精品| 一区二区三区乱码不卡18| 少妇被粗大的猛进出69影院| 精品久久久久久电影网| 水蜜桃什么品种好| 国产精品九九99| 大码成人一级视频| 妹子高潮喷水视频| 男女之事视频高清在线观看| 人人妻人人添人人爽欧美一区卜| 国产在线观看jvid| 亚洲熟女精品中文字幕| 色老头精品视频在线观看| 欧美黑人欧美精品刺激| 一本色道久久久久久精品综合| 女同久久另类99精品国产91| 久久人妻福利社区极品人妻图片| 最近最新中文字幕大全电影3 | 日韩欧美一区视频在线观看| 国产极品粉嫩免费观看在线| 一级a爱视频在线免费观看| 岛国毛片在线播放| 午夜久久久在线观看| 纯流量卡能插随身wifi吗| 亚洲av日韩在线播放| 淫妇啪啪啪对白视频| 欧美精品高潮呻吟av久久| 欧美乱妇无乱码| 免费在线观看视频国产中文字幕亚洲| 美女高潮喷水抽搐中文字幕| 色综合欧美亚洲国产小说| 悠悠久久av| 国产免费福利视频在线观看| 一级毛片精品| 他把我摸到了高潮在线观看 | 精品人妻在线不人妻| 99香蕉大伊视频| 欧美性长视频在线观看| 岛国毛片在线播放| 久久ye,这里只有精品| 黑人巨大精品欧美一区二区蜜桃| 桃红色精品国产亚洲av| 超碰成人久久| 亚洲中文av在线| 国产亚洲午夜精品一区二区久久| 新久久久久国产一级毛片| 91国产中文字幕| 精品久久久精品久久久| 日本黄色日本黄色录像| www.熟女人妻精品国产| 一个人免费看片子| 亚洲人成电影免费在线| 亚洲专区国产一区二区| 少妇裸体淫交视频免费看高清 | 男人操女人黄网站| 欧美日韩av久久| 91成年电影在线观看| 欧美精品av麻豆av| 国产精品久久久av美女十八| 精品熟女少妇八av免费久了| 变态另类成人亚洲欧美熟女 | 一边摸一边做爽爽视频免费| 18禁美女被吸乳视频| 国产av国产精品国产| avwww免费| 亚洲国产av影院在线观看| 国产精品亚洲一级av第二区| 狠狠婷婷综合久久久久久88av| 黄片播放在线免费| 欧美在线黄色| av片东京热男人的天堂| 亚洲精品中文字幕在线视频| 老鸭窝网址在线观看| 国产成人精品久久二区二区免费| 91精品三级在线观看| 国产激情久久老熟女| 99国产极品粉嫩在线观看| 亚洲五月婷婷丁香| 欧美激情久久久久久爽电影 | 水蜜桃什么品种好| 黄频高清免费视频| 午夜日韩欧美国产| 99re6热这里在线精品视频| 高清av免费在线| 亚洲精品在线观看二区| 国产欧美日韩一区二区精品| 国产精品免费视频内射| 91av网站免费观看| 成人精品一区二区免费| 99国产精品免费福利视频| 美女扒开内裤让男人捅视频| 免费看a级黄色片| 成年人黄色毛片网站| 精品福利观看| 9色porny在线观看| 巨乳人妻的诱惑在线观看| 日本一区二区免费在线视频| 一区二区三区激情视频| 久久人妻熟女aⅴ| 国精品久久久久久国模美| 蜜桃在线观看..| 老司机福利观看| 丝瓜视频免费看黄片| 欧美乱妇无乱码| 亚洲精品一卡2卡三卡4卡5卡| 丝袜美腿诱惑在线| 午夜福利视频精品| 人妻一区二区av| 操美女的视频在线观看| 欧美日韩黄片免| 最近最新免费中文字幕在线| av不卡在线播放| 91成年电影在线观看| 黄色a级毛片大全视频| 精品视频人人做人人爽| 欧美黄色淫秽网站| 久久精品国产a三级三级三级| 黄片大片在线免费观看| 国产精品久久久久久精品电影小说| 大陆偷拍与自拍| 色视频在线一区二区三区| 考比视频在线观看| 国产激情久久老熟女| 午夜福利视频在线观看免费| 久久午夜亚洲精品久久| 岛国在线观看网站| 欧美激情高清一区二区三区| 天堂8中文在线网| 色在线成人网| 免费看十八禁软件| 又黄又粗又硬又大视频| 亚洲成人免费av在线播放| 后天国语完整版免费观看| 国产精品98久久久久久宅男小说| 人成视频在线观看免费观看| 五月天丁香电影| 日韩三级视频一区二区三区| 高潮久久久久久久久久久不卡| 国产精品久久久人人做人人爽| 亚洲国产欧美在线一区| 色在线成人网| 亚洲伊人久久精品综合| 久久久久久人人人人人| 如日韩欧美国产精品一区二区三区| 久久国产精品影院| a级毛片在线看网站| 欧美 亚洲 国产 日韩一| 视频区欧美日本亚洲| 一级毛片女人18水好多| 亚洲精品美女久久久久99蜜臀| 成人影院久久| 久久久欧美国产精品| 自拍欧美九色日韩亚洲蝌蚪91| 人人妻,人人澡人人爽秒播| 亚洲人成电影免费在线| 在线亚洲精品国产二区图片欧美| 国产色视频综合| 国产精品亚洲一级av第二区| 99riav亚洲国产免费| 九色亚洲精品在线播放| 一级,二级,三级黄色视频| 一边摸一边抽搐一进一出视频| 香蕉丝袜av| 午夜91福利影院| 欧美激情极品国产一区二区三区| 在线播放国产精品三级| 丁香六月天网| 日韩一卡2卡3卡4卡2021年| 久久久久久久大尺度免费视频| 亚洲五月婷婷丁香| 欧美日韩黄片免| 青草久久国产| 久久久久久免费高清国产稀缺| 国产黄色免费在线视频| 又紧又爽又黄一区二区| a在线观看视频网站| 曰老女人黄片| 日韩人妻精品一区2区三区| 老熟妇乱子伦视频在线观看| 国产精品 国内视频| 欧美日韩av久久| 纵有疾风起免费观看全集完整版| 高清欧美精品videossex| 欧美日韩亚洲综合一区二区三区_| 一区二区三区国产精品乱码| 91成年电影在线观看| 国产精品电影一区二区三区 | 69精品国产乱码久久久| 在线观看66精品国产| 日本a在线网址| 黄色怎么调成土黄色| 99国产精品免费福利视频| 久久人妻av系列| 亚洲,欧美精品.| 国产高清国产精品国产三级| 黄片小视频在线播放| 搡老乐熟女国产| 在线永久观看黄色视频| 国产精品一区二区免费欧美| 亚洲熟妇熟女久久| 少妇猛男粗大的猛烈进出视频| 亚洲精品粉嫩美女一区| 久久国产亚洲av麻豆专区| 国产精品.久久久| 精品高清国产在线一区| 国产精品九九99| 日本av手机在线免费观看| 亚洲成人免费av在线播放| 夜夜夜夜夜久久久久| av天堂在线播放| 菩萨蛮人人尽说江南好唐韦庄| av天堂在线播放| 99热网站在线观看| 新久久久久国产一级毛片| 成人国语在线视频| 精品国产一区二区三区四区第35| 久久久精品94久久精品| 美女高潮喷水抽搐中文字幕| 国精品久久久久久国模美| 国产亚洲欧美在线一区二区| 精品国产国语对白av| 亚洲中文av在线| 精品少妇内射三级| 叶爱在线成人免费视频播放| 五月天丁香电影| 久久亚洲真实| 在线观看www视频免费| 满18在线观看网站| 曰老女人黄片| a级毛片在线看网站| 亚洲欧美精品综合一区二区三区| 在线看a的网站| 不卡av一区二区三区| 人成视频在线观看免费观看| 国产日韩欧美视频二区| 亚洲一卡2卡3卡4卡5卡精品中文| 日韩免费av在线播放| 亚洲伊人久久精品综合| 啦啦啦免费观看视频1| 亚洲avbb在线观看| 亚洲,欧美精品.| 黄色丝袜av网址大全| 国产一卡二卡三卡精品| 窝窝影院91人妻| 国产精品.久久久| 欧美日韩国产mv在线观看视频| 日韩欧美免费精品| 国产精品99久久99久久久不卡| 亚洲国产欧美一区二区综合| 国产精品一区二区精品视频观看| 中国美女看黄片| 妹子高潮喷水视频| 亚洲国产av新网站| 日韩 欧美 亚洲 中文字幕| 成人18禁在线播放| 亚洲久久久国产精品| 亚洲精品av麻豆狂野| 久久国产精品大桥未久av| 一本久久精品| a级毛片在线看网站| 久久久精品区二区三区| 99热国产这里只有精品6| 国产男靠女视频免费网站| 婷婷丁香在线五月| 蜜桃在线观看..| xxxhd国产人妻xxx| 一个人免费在线观看的高清视频| 免费日韩欧美在线观看| 99riav亚洲国产免费| 悠悠久久av| 性少妇av在线| h视频一区二区三区| 最新美女视频免费是黄的| 男女床上黄色一级片免费看| 亚洲色图综合在线观看| 亚洲欧美精品综合一区二区三区| 这个男人来自地球电影免费观看| 999久久久精品免费观看国产| 69精品国产乱码久久久| 涩涩av久久男人的天堂| 国产精品 欧美亚洲| 亚洲第一青青草原| 亚洲色图综合在线观看| 肉色欧美久久久久久久蜜桃| 久久国产精品影院| 亚洲人成电影免费在线| 飞空精品影院首页| 桃花免费在线播放| 国产又色又爽无遮挡免费看| 黄片播放在线免费| 精品国产一区二区三区久久久樱花| 在线 av 中文字幕| 黄片大片在线免费观看| 日韩欧美国产一区二区入口| 一级片'在线观看视频| 18禁国产床啪视频网站| 91精品国产国语对白视频| 久久人妻熟女aⅴ| 亚洲欧美日韩另类电影网站| 女警被强在线播放| 日韩 欧美 亚洲 中文字幕| 国产日韩一区二区三区精品不卡| 91成年电影在线观看| 久久久久网色| 青草久久国产| 精品亚洲成a人片在线观看| 国产男女内射视频| 国产精品二区激情视频| 欧美乱码精品一区二区三区| 午夜福利在线观看吧| 亚洲午夜精品一区,二区,三区| 99riav亚洲国产免费| 久久人人97超碰香蕉20202| 精品午夜福利视频在线观看一区 | 国产精品秋霞免费鲁丝片| 日韩视频在线欧美| 高潮久久久久久久久久久不卡| 精品国产一区二区三区久久久樱花| 黄色视频在线播放观看不卡| av福利片在线| 免费少妇av软件| 黑人欧美特级aaaaaa片| 亚洲av电影在线进入| 欧美日韩精品网址| 99精品久久久久人妻精品| 欧美精品高潮呻吟av久久| 久久影院123| 免费高清在线观看日韩| 亚洲精品一卡2卡三卡4卡5卡| 午夜精品久久久久久毛片777| 男女午夜视频在线观看| 搡老乐熟女国产| 精品久久久久久久毛片微露脸| 欧美日韩精品网址| 成人黄色视频免费在线看| 国产男靠女视频免费网站| 成人18禁在线播放| 成人亚洲精品一区在线观看| 777久久人妻少妇嫩草av网站| 桃红色精品国产亚洲av| 丁香六月天网| 亚洲欧洲精品一区二区精品久久久| 国产午夜精品久久久久久| 色婷婷久久久亚洲欧美| 欧美乱妇无乱码| 亚洲美女黄片视频| 丰满迷人的少妇在线观看| 国产av精品麻豆| 欧美成人午夜精品| 夜夜夜夜夜久久久久| kizo精华| 午夜91福利影院| 18在线观看网站| 亚洲少妇的诱惑av| 自拍欧美九色日韩亚洲蝌蚪91| 十八禁网站网址无遮挡| 女性被躁到高潮视频| 免费观看a级毛片全部| 国产xxxxx性猛交| xxxhd国产人妻xxx| 性色av乱码一区二区三区2| 天堂俺去俺来也www色官网| 一边摸一边抽搐一进一小说 | 欧美日韩亚洲综合一区二区三区_| 黑人巨大精品欧美一区二区mp4| 精品久久久久久电影网| 91麻豆精品激情在线观看国产 | 伦理电影免费视频| 大陆偷拍与自拍| 亚洲欧美激情在线| 首页视频小说图片口味搜索| 天堂动漫精品| 亚洲一区中文字幕在线| 精品国产乱码久久久久久小说| 亚洲精品久久成人aⅴ小说| 亚洲 欧美一区二区三区| 狠狠狠狠99中文字幕| 成人特级黄色片久久久久久久 | 精品国产国语对白av| 这个男人来自地球电影免费观看| a级毛片黄视频| 久久久久国内视频| 另类精品久久| 亚洲综合色网址| 宅男免费午夜| 日韩免费高清中文字幕av| 免费人妻精品一区二区三区视频| 涩涩av久久男人的天堂| 黄片播放在线免费| 满18在线观看网站| 伊人久久大香线蕉亚洲五| 国产精品 欧美亚洲| 国产一区二区三区在线臀色熟女 | 午夜91福利影院| 91国产中文字幕| 国产真人三级小视频在线观看| av天堂久久9| 欧美黑人精品巨大| 一级毛片精品| cao死你这个sao货| 老熟女久久久| 国产在线精品亚洲第一网站| 国产伦人伦偷精品视频| 久久久久久久大尺度免费视频| 午夜成年电影在线免费观看| 露出奶头的视频| 一边摸一边做爽爽视频免费| 亚洲成国产人片在线观看| 亚洲精品美女久久久久99蜜臀| 曰老女人黄片| 性少妇av在线| 91精品三级在线观看| 老司机在亚洲福利影院| 国产一区二区在线观看av| 午夜福利,免费看| 色老头精品视频在线观看| 午夜老司机福利片| 国产91精品成人一区二区三区 | 在线观看免费日韩欧美大片| 亚洲第一av免费看| av国产精品久久久久影院| 国产精品av久久久久免费| 美女视频免费永久观看网站| 欧美另类亚洲清纯唯美| 国产一区二区三区在线臀色熟女 | 亚洲色图av天堂| 免费不卡黄色视频| 人妻一区二区av| 手机成人av网站| 极品人妻少妇av视频| 天堂动漫精品| 国产精品98久久久久久宅男小说|