• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Lightweight,Searchable,and Controllable EMR Sharing Scheme

    2024-05-25 14:42:58XiaohuiYangandPeiyinZhao
    Computers Materials&Continua 2024年4期

    Xiaohui Yang and Peiyin Zhao

    School of Cyber Security and Computer,Hebei University,Baoding,071000,China

    ABSTRACT Electronic medical records(EMR)facilitate the sharing of medical data,but existing sharing schemes suffer from privacy leakage and inefficiency.This article proposes a lightweight,searchable,and controllable EMR sharing scheme,which employs a large attribute domain and a linear secret sharing structure(LSSS),the computational overhead of encryption and decryption reaches a lightweight constant level,and supports keyword search and policy hiding,which improves the high efficiency of medical data sharing.The dynamic accumulator technology is utilized to enable data owners to flexibly authorize or revoke the access rights of data visitors to the data to achieve controllability of the data.Meanwhile,the data is re-encrypted by Intel Software Guard Extensions(SGX)technology to realize resistance to offline dictionary guessing attacks.In addition,blockchain technology is utilized to achieve credible accountability for abnormal behaviors in the sharing process.The experiments reflect the obvious advantages of the scheme in terms of encryption and decryption computation overhead and storage overhead,and theoretically prove the security and controllability in the sharing process,providing a feasible solution for the safe and efficient sharing of EMR.

    KEYWORDS Lightweight;keyword search;large attribute domain;controllability;blockchain

    1 Introduction

    In today’s information age,data is considered an important asset[1].However,in the healthcare sector,the secure and efficient sharing of electronic medical records has always been a challenge.Since 2020,the cost of healthcare data breaches has increased by 53.3%,and for the 13th consecutive year,the healthcare industry has reported the most costly data breaches with an average loss of $10.93 million[2].Healthcare data contains a large amount of private information such as patients’identity and medical history,which can pose serious security risks to patients if compromised [3].However,electronic healthcare data sharing has become a key trend in healthcare.Most patients are willing to share their personal medical data under the premise of ensuring patient privacy and data security[4].The Healthcare Medical Data Compliance Circulation Standard provides a regulatory framework for healthcare data circulation[5],which is a major advancement in healthcare data circulation.

    Medical data includes sensitive data such as medical history and personal health information.Once illegally accessed,it not only violates personal privacy,but also may lead to serious consequences such as identity theft.At the same time,the rights and interests of data owners cannot be safeguarded due to the lack of sufficient trust between data owners and data visitors.Therefore,it is very important to ensure the rights and interests of the data owner and privacy,while at the same time achieve efficient access to e-medical data by data visitors.On the basis of CP-ABE,Zheng et al.[6] proposed the ciphertext policy-based keyword searchable attribute-based encryption (CP-ABKS) scheme,which allows to retrieve the encrypted documents through keyword search while maintaining fine-grained access control,but the use of a tree structure is less efficient and cannot achieve the resistance to the keyword guessing attack,and also the data owner’s controllability over the data,thus effectively guaranteeing the data owner’s rights and privacy while ensuring the data visitor’s efficient access to the electronic medical data.Zhang et al.[7] proposed a partial policy hiding scheme against attribute value guessing attack using interactive online privacy protection test,which can resist offline dictionary guessing attack,but with low efficiency and no controllability of data by data owner.Li et al.[8]realized data sharing based on proxy re-encryption,and at the same time,realized a certain controllability of data by data owner.The data sharing is based on proxy re-encryption technique,while the data owner has some control over the data,and the blockchain is used to verify the user privileges and record the request content to achieve a certain degree of regulatory control,but the scheme is not able to resist the offline dictionary guessing attack,and the sharing efficiency also needs to be improved.In order to promote efficient and secure sharing of healthcare data,new technologies and strategies must be used to address these issues.

    To address the above problems,this paper proposes a lightweight,searchable,and controllable EMR sharing scheme,which utilizes a large attribute domain and a linear secret sharing structure to improve the flexibility and efficiency of medical data sharing,reduces the encryption and decryption overhead of the medical data during the sharing process,and decrypts the ciphertext with a constant level of computation.Using Intel SGX technology,a secure container Enclave is opened in the system to re-encrypt the data and change the structure of the data,thus realizing the resistance to offline dictionary guessing attacks and avoiding the interaction of data visitors in the server during the search process.Adopting dynamic accumulator technology,the data owner can flexibly manage authorized users,including the update and revocation of privileges,etc.,which enhances the owner’s controllable degree of its own data.The summary and Hash of the access rows of the data visitors are uploaded to the blockchain,and by using the characteristics of blockchain such as tampering,the regulation can trace the request process of the data,and carry out credible judgments and pursuing responsibilities when there is anomalous behavior.The main contributions of this paper are summarized as follows.

    The solution adopts the LSSS structure and supports large attribute domains,which further improves the flexibility and efficiency of the existing solution and can be adapted to devices with limited computing resources.

    The application of Intel SGX further guarantees the security of the data sharing process.

    The combination of dynamic accumulator technology and blockchain technology further increases the rights and interests of data owners in the sharing process.

    The paper is organized as follows.The second part presents the related research work.The third part provides the basics of the theoretical model.The fourth part first introduces the design of the scheme and details the key processes such as algorithms in the scheme.The fifth part is the security analysis of the scheme.The sixth part is the experimental verification and analysis.Finally,the seventh part summarizes and discusses.

    2 Related Work

    In recent years,the emergence of emerging technologies such as Deep Learning [9],Edge Computing[10]and Knowledge Graphs[11]has contributed significantly to the research on efficient sharing of data.In sensitive domains such as electronic medical record sharing,fine-grained data access control mechanisms are required.However,some traditional searchable encryption(SE)schemes do not support fine-grained access control[12].In this context,Attribute-Based Encryption(ABE)[13]has been proposed as an effective solution to achieve finer-grained access control.Sun et al.[14]extended this concept and implemented a verifiable CP-ABKS scheme in a multiuser environment,which supports user revocation and is resistant to keyword guessing Attacks.Access policies may reveal sensitive information about the data owner,which makes it crucial to hide the access policies,but none of the above schemes support policy hiding.Nishide et al.[15]proposed a wildcard-based scheme for policy hiding,but it only supports the“and gate”structure,which makes it more demanding and less flexible in terms of computing resources.However,only the“and gate”structure is supported,which makes it more demanding on computational resources and less flexible.In order to overcome these limitations,Lai et al.[16] proposed a more flexible partial policy hiding scheme based on ensemble groups using Linear Secret Sharing Scheme(LSSS),but this scheme also does not support keyword search.

    Qiu et al.[17] proposed a new CP-ABKS scheme that supports policy hiding with resistance to keyword guessing attacks and effectively restricts the possibility of unauthorized users to perform searches,but there is a lack of research on data encryption.Based on this,Wang et al.[18]proposed a data owner attribute-based encryption scheme with policy hiding that can be searched and revoked to enable data sharing by multiple owners.Miao et al.[19] proposed a keyword search scheme with privacy preservation and support for multi-owner cooperation that supports policy hiding and user tracking.However,schemes [17–19] are based on the partial policy hiding implemented in Nishide et al.’s[15]scheme,with low flexibility and scalability of access control,and none of them can resist offline dictionary guessing attacks.Ma et al.[20]proposed an innovative EMR access control model and fine-grained data sharing mechanism for resource-constrained mobile devices,and addressed challenges of data privacy protection and challenges such as computational efficiency optimization,but fails to achieve controllability of data by the data owner.The DNACDS scheme proposed by Singh et al.[21] and the LBP-RDH technique proposed by Sahu et al.[22] also provide some new ideas for healthcare data security and sharing.

    While improving the efficiency of healthcare data access control,the controllability of the data flow of the data owner’s data during the sharing process is equally important.Since the emergence of Bitcoin in 2009,its underlying blockchain technology has gradually received attention from the research field of healthcare data sharing controllability due to its characteristics.Xia et al.[23]proposed MeDShare,a healthcare data management system in a trustless environment,where data manipulation behaviors are logged and user permissions are managed,but there is a high overhead in verifying user permissions.Gao et al.[24]designed a blockchain-based medical data sharing scheme using searchable encryption and secret sharing techniques.The scheme takes into account the problem that cloud storage servers are not fully trusted and uses secret sharing techniques to support sharing by multiple users,but the interaction process of the scheme is relatively complex and the system coupling is relatively high.Sun et al.[25]proposed a blockchain-and smart contract technology based distributed electronic searchable scheme for medical data,which achieves decentralization of data storage and fine-grained control of data access,and at the same time adopts an attribute-based encryption scheme to ensure data privacy,but the system efficiency needs to be further improved.Wu et al.[26]proposed a blockchain-based smart healthcare system,which has fine-grained privacy protection,and can reliably exchange and share data among different users but cannot resist offline dictionary guessing attacks.

    Zhou et al.[27] designed a sharing scheme for healthcare data by combining attribute-based encryption and blockchain technology from access control in the time dimension.Although a regulatory center is set up to manage the user’s identity,there is little flexibility to restrict data sharing from the time dimension.Chelladurai et al.[28]used blockchain smart contracts to provide a secure,efficient and seamless solution to support healthcare information exchange and peer-to-peer contracts with cryptographic hash functions to ensure high security and integrity,but the user cannot achieve effective data control.Lin et al.[29] proposed the UDVSP scheme and the EMRChain system to achieve efficient and secure blockchain-based EMR sharing with bilinear unpaired and anti-malicious propagation,which was demonstrated through a comprehensive performance evaluation shows that these schemes are feasible,but cannot resist offline dictionary guessing attacks.Gao et al.[30]proposed a blockchain-based searchable encryption scheme that implements fine-grained access control and EHR sharing on the cloud,ensuring data integrity and fairness of transactions,while resisting adaptive keyword selection attacks,but with poor data controllability for the data owner.

    Based on the above statement,the current scheme does not simultaneously weigh the relationship between efficient encryption and decryption of medical data and sharing and the effective controllability of data owners’data,therefore,in this paper,we propose a lightweight searchable and controllable electronic medical record sharing scheme,which adopts the large attribute domain,the LSSS structure,and the Intel SGX technology to realize the function of keyword search,policy hiding,and offline dictionary guessing attack.The keyword search,strategy hiding and offline dictionary guessing attack functions,which improve the sharing efficiency and ensure the security of the data at the same time;through the combination of dynamic accumulator technology and blockchain technology,it is to realize the controllability of the data by the data owner and the credible judgment and accountability of the regulator,which fully protects the rights and interests of the data owner.

    3 Preliminaries

    3.1 Composite Order Bilinear Group

    Apply a bilinear group of composite orderQ=p1p2p3,wherep1,p2andp3are three different prime numbers.GandGTare two multiplicative cyclic groups of orderQ=p1p2p3.is a subgroup ofGwith orderpi,and(i/=j)is a subgroup ofGwith orderpipj.The bilinear mappinge:G×G→GTsatisfies the following properties:

    1) Bilinearity:for anyu,v∈Ganda,b∈Zp,hase=e(u,v)ab.

    2) Non-degeneracy:there existsg∈Gsuch that the order ofe(g,g)inGTisQ.

    3) Computability:for anyu,v∈G,there exists an efficient algorithm to computee(u,v).

    4) Orthogonality of subgroups:for ?gi∈and ?gj∈(i/=j),hase=1.

    3.2 Access Structure

    In order to achieve effective control of the data owner over the data visitor,it is necessary to customize the access authorization set,which is satisfied to continue access,otherwise access is denied.Let {P1,P2,···,Pn} be a set of entities comprisingnparticipants.For setA?,if ?B,CwhereB∈AandB?C,hasC∈A,thenAis said to be monotone.IfAis a non-empty subset of{P1,P2,···,Pn},that is,A?{?},thenAis considered an access structure.All sets included inAare termed as authorized sets,and those not included inAare termed as non-authorized sets.

    3.3 Intel SGX

    Intel SGX is an extension of the existing Intel architecture,comprising a new set of instruction sets and memory access mechanisms [31] that allow applications to create an isolated execution environment known as an Enclave.An Enclave serves as a trusted and secure entity for storing data and executing code.It possesses three key security features:Isolation,sealing,and attestation[32].The feature of isolation restricts access to a protected area of memory hardware to only specific Enclaves.The encryption is performed using a sealing key that is private to a specific Enclave,and no process other than an exact replica of the Enclave is able to decrypt or modify it.Attestation allows verifiers to authenticate that the code is running securely within an Enclave and has not been tampered with.SGX offers two types of attestation:Local and remote[33].Local attestation is used for authentication between two Enclaves on the same platform,where they can derive a shared key using a root sealing key shared between them.Remote attestation enables an Enclave to generate reports that can be verified by any remote entity.

    4 Scheme Design

    4.1 Scheme Overview

    The lightweight searchable and controllable electronic medical record sharing scheme(EMR_LSC SS) designed in this paper is shown in Fig.1.The system mainly includes six participating entities:Cloud Server (CS),Regulatory and Authorization Center (RAC),Data Owner (DO),Data Visitor(DV),Blockchain(BC),and Enclave.

    4.2 Specific Algorithm Processes

    The scheme presented in this article primarily comprises algorithms for System initialization,Key generation,Accumulator initialization,Encryption,Re-encryption,Search request,Authorization search,Search token generation,Search and Decryption.The symbol description is shown in Table 1 and specific algorithmic processes are as follows.

    Table 1: Symbol description table

    1.Key generation algorithm.This algorithm is executed by RAC.

    2.Accumulator initialization algorithm.This algorithm is executed by DO.

    3.Encryption algorithm.This algorithm is executed by DO.

    4.Re-Encryption algorithm.This algorithm is executed by Enclave.

    5.Search request algorithm.This algorithm is executed by DV.

    6.Authorization search algorithm.This algorithm is executed by DO.

    7.Search token generation algorithm.This algorithm is executed by DV.

    8.Search algorithm.This algorithm is executed by CS.

    9.Decryption algorithm.This algorithm is executed by DV.

    5 Security Analysis of the Scheme

    The scheme has the ability to resist offline dictionary guessing attacks and is controllable by the data owner.This section proves its security.

    5.1 Proof of Security against Offline Dictionary Guessing Attacks

    Offline Dictionary Guessing Attacks generally target keywords or attribute values.In this paper’s solution,the keywords and attribute values are included in the keyword index and the search tokens.Therefore,the following will provide a security analysis for resistance to Offline Dictionary Guessing Attacks from the perspectives of the keyword index and search tokens.In this context,the CS acts as the attacker,with the attributes{ci,vi}and keywordsKwiall being elements from the offline dictionary.

    Assumption 1:CDH(Computational Diffie-Hellman problem)Assumption

    Let us presume a multiplicative cyclic groupGwith its order being a prime numberp,andgbeing a generator of the cyclic groupG.Calculation parametersa,b∈Zpare selected randomly.The CDH assumption can be understood as:It is quite difficult to solvegabthroughgaandgb.

    Theorem 1:If the CDH assumption holds,then the scheme proposed in this paper can resist offline dictionary guessing attacks based on keywords and indices.

    Theorem 2:The scheme proposed in this paper can resist offline dictionary attacks directed at search tokens.

    According to the above proof it can be seen that the attacker finds a polynomial in polynomial time and puts the keywords and attribute values from the offline dictionary into the discriminant in order to check whether the discriminant is valid or not,and it turns out that the discriminant is invalid,so this paper’s scheme is resistant to offline dictionary guessing attack security.

    5.2 Proof of Security for Data Owner’s Control over Their Data

    Assumption 2:Given the fulfillment of the following conditions,the data owner has controllability over their own data,that is,the scheme proposed in this paper offers data controllability security.

    In the aforementioned equation,f(μ)is a negligible function,implying that the probability of DV not receiving authorization from DO is approaching 1.

    Theorem 3:During the process in which the data visitor requests the data owner for data sharing,only those data visitors authorized by the data owner can obtain the corresponding data.That is,the data owner has controllability over personal data.

    Based on the above proof,it can be seen that DO can control the flow of its own data,i.e.,it can flexibly authorize data access to other DVs or revoke the authorization to a certain DV to ensure the controllability of its own data.

    6 Performance Analysis of the Scheme

    6.1 Experimental Environment

    In order to gain a more intuitive understanding of the performance of the proposed scheme,this simulation experiment uses Java language and calls a third-party Java pairing based encryption(JPBC)library to simulate some of the algorithms in this scheme.The experimental environment configuration is shown in Table 2.

    Table 2: Experimental environment configuration

    In this paper,an extension of the Type A elliptic curve characterized by the equationy2=x3+xis employed for simulative experiments.The encrypted Electronic Medical Record dataset utilized is the COVID-19 Dataset [34],which is provided by the Mexican government and comprises a vast amount of anonymized patient-related information,including preexisting conditions.The original dataset consists of 21 unique features and 1,048,576 unique patients.During simulation experiments,the range of attribute numbersnand the number of rows in the matrixIwere both set within the interval[0,50],with the number of candidate values per attributeniset as 5.

    6.2 Function Analysis

    This section compares the seven functions of keyword search and large attribute domains,resistance to offline dictionary guessing attacks,constant decryption overhead,access structure,controllability,and trusted accountability with the schemes of Miao et al.[19],Zhang et al.[7],and Gao et al.[30].The comparison results are shown in Table 3.

    Table 3: Function comparison table

    The comparative results presented in the table above allow for the following conclusions.Firstly,the scheme by Miao solely supports keyword search functionality,with an access structure that employs an AND-gate paradigm.Notably,the decryption overhead in their scheme is closely linked to the count of data owners and collaborating parties,which makes it impossible to achieve a constant decryption cost.Secondly,Zhang,despite supporting a vast attribute space and the incorporation of a LSSS structure,and endowing the capability to withstand offline dictionary guessing attacks,exhibit a decryption overhead similar to that of Miao.This cost is not constant either but varies with the number of user attributes.Lastly,Gao have accomplished fine-grained access control and sharing of EMR in the cloud,albeit lacking in mechanisms to counteract offline dictionary attacks and in providing data owners with the power of control.

    This study takes into consideration the advantages of the aforementioned schemes and incorporates technologies such as dynamic accumulators and blockchain.By utilizing these technologies,ensure controllability by data owners over data access and accountable trustworthiness,all the while fulfilling the requirement for low computational resource overhead.Compared to the previous schemes,the proposal in this paper exhibits significant merits.

    6.3 Computational Overhead

    Drawing on the comparative experiments of Miao and Zhang,this section will evaluate the computational cost of some algorithm processes in this paper through theoretical and simulation experiments.By conducting 500 tests and taking the average,the specific unit time results are shown in Table 4.

    Table 4: Computational cost per unit for common cryptographic algorithms

    1)The computational overheads of the proposed scheme in comparison to other schemes during system initialization,key generation,encryption,and shared decryption phases are delineated in Table 5 below.Within this context,nidenotes the number of candidates per attribute,nrepresents the number of attributes,Icorresponds to the number of rows in the access matrix,and d signifies the number of collaborators of the data owner.During the system initialization phase,the computational overhead for Miao is related to both the number of system attributesnand the number of candidate values per attributeni.In contrast,the proposed scheme in this paper,akin to that of Zhang,is predicated upon a large attribute space,hence the computation overhead remains a constant at a constant-time complexity,which is significantly less than that of Miao.

    Table 5: Computational overhead comparison

    Moreover,the computational overhead of the scheme presented in this paper is also marginally lower than that of Zhang.In the key generation phase,the computational overhead of our scheme is reduced by at leastnE1compared to other benchmark schemes.The encryption phase of the scheme under consideration includes both data and index encryption.The computational overhead of Miao is contingent upon the number of collaboratorsdof the data owner,which diverges from the focus of our scheme.Relative to Zhang,the encryption cost of our scheme is approximately 2IE1lower.During the search token generation stage,the computational overhead of our approach is comparable to that of other schemes.

    Owing to the adoption of LSSS structure within the scheme proposed in this article,the reconstruction of the secret values entails exponential operations,thus rendering the computational overhead during the search phase of our scheme relatively higher compared to that of Zhang.Nevertheless,the computational overhead ofETis marginal;therefore,the additional overhead introduced in the search phase is deemed acceptable.Ultimately,in the decryption phase,the computational cost of the scheme by Zhang.is contingent upon the number of user attributesn,whereas the overhead of the scheme elucidated in this work is fixed at a constant-time complexity,which confers a considerable advantage.

    The scheme from Miao involves the number of data owner’s collaboratorsdduring the encryption,key generation,and decryption phases.However,this variable is not included in the scheme presented in this paper and that of Zhang For ease of comparison between the schemes,d=1,and then a comparison is performed.

    The temporal overhead associated with system initialization is depicted in Fig.2.During the system initialization phase,the time overhead of the scheme proposed by Miao exhibits a linear growth trend with respect to the number of attributes m.In contrast,the time overhead for the scheme presented in this paper as well as that by Zhang remains constant,with notably lower expenses.

    The encryption time overhead is illustrated in Fig.3.During the encryption phase,the time overhead for the schemes proposed by Miao and Zhang both display an exponential growth as a function of the increase in the number of rows I in the sharing matrix.Although the time overhead for the scheme presented in this paper also rises with an increase in the number of rows I,under the stipulated assumptions,the rate of increase for this paper’s scheme is substantially slower than that of Zhang,and is only slightly higher than that of Miao.Furthermore,considering that the cooperating number of data owners d is a relatively large value,and not merelyd=1,in practical scenarios,the growth rate of Miao would be much faster than that of the scheme proposed in this paper.

    Figure 2: System initialization time overhead

    Figure 3: Encryption time overhead

    The temporal overhead of the key generation phase is depicted in Fig.4.Although the scheme in this paper grows linearly with the schemes of Miao and Zhang,the growth rate is significantly lower than that of Miao and Zhang.

    The decryption time overhead is illustrated in Fig.5.The program of Miao has a significantly higher growth rate than the program in this paper.Although the time overhead for Zhang is a relatively small constant when the variable d is presumed to be a constant value of one,in practical scenarios,d is often significantly greater than this value.In contrast,the decryption time overhead of the scheme presented within this paper remains constant and invariant.Consequently,in comparison,the computation during this phase is more efficient in the approach proposed by this study.

    Figure 4: Key generation time overhead

    Figure 5: Decryption time overhead

    As discerned from Table 6.During the system initialization phase,when n=50,the time overhead for the scheme by Miao amounts to 2801.6 ms,for Zhang,it is 40.7 ms,whereas for the scheme proposed in this paper it accounts for 30.9 ms.Consequently,the scheme proposed in this paper demonstrates a significant advantage during the system initialization stage.In the key generation phase,the scheme proposed by Miao incurs a time expense of 1179.5 ms,while that of Zhang amounts to 1173.5 ms,with both exhibiting comparable temporal overheads.In contrast,the scheme presented in this paper demonstrates a significantly reduced time consumption of 624.1 ms,markedly outperforming the approaches of Miao and Zhang.In the encryption stage,when I=50,the time overhead for the scheme proposed in this paper is 1605.2 ms,for Miao it is 1198.7 ms,and for the scheme of Zhang it is 2878.9 ms.In actual scenarios,the scheme presented in this paper holds a distinct advantage in terms of time overhead.In the decryption stage,the time overhead associated with Zhang exhibits a noticeable increase with the addition of attributes.Under the assumption of specific conditions,the time overhead for the scheme by Miao is 32.1 ms,while that for Zhang and colleagues’scheme is 698.7 ms,and the approach introduced in this article incurs a time expense of 38.1 ms,has a clear advantage.

    Table 6: Stage time cost

    In terms of the search token generation and search time overhead,a comparison is drawn between the scheme presented in this paper and that of Miao,as the scheme by Zhang does not incorporate these two stages.The temporal overhead during the search phase is comparable between the two approaches;however,in the phase of search token generation,the scheme of Miao almost doubles the time expense of the scheme proposed in this article.Therefore,the approach delineated herein proves to be more efficient in both of these stages.

    In the stages of re-encryption,accumulator initialization,search requests,and authorization requests,the scheme proposed in this paper adds several functionalities compared to the schemes by Miao and Zhang.Through logical analysis and simulation experiments,these additional functionalities are deemed to be within a reasonable range.

    6.4 Storage Overhead

    This section will analyze the partial overhead associated with the proposed scheme in the context of non-blockchain storage.Herein,|G1|denotes the size of elements in the groupG1,and similarly,|G2|,|GT|andrepresent the sizes of elements in the groupsG2,GTandZp,respectively.Under the elliptic curve defined by the equationy2=x3+x,it holds that |G1|=|G2|=|GT|.Due to functional discrepancies between the scheme introduced in this paper and those by Miao and Zhang,a comparative assessment of storage overhead is limited to five key aspects:System public keys,system master keys,private keys,search tokens,and encrypted indexes—specifically,ciphertexts associated with indexes.The outcomes are tabulated in Table 7.

    Table 7: Storage overhead

    Lastly,for the storage of ciphertexts and indexes,the proposed scheme’s overhead is(2I+4)|G1|,whereas the overhead for both the other schemes surpasses that of the scheme detailed in this document.A theoretical analysis and simulation experiments were conducted on the other functional modules of the proposed scheme for their storage overhead,and the results indicate that the overhead is also within a reasonable range.

    7 Summary

    The current work introduces a lightweight,searchable,and controllable EMR sharing scheme.The proposed framework integrates keyword search with policy hiding,employing large attribute domains and a linear key-sharing structure to enhance the scalability and flexibility of access control.Within this scheme,Intel SGX technology is utilized to re-encrypt data,effectively thwarting offline dictionary guessing attacks and reducing decryption computational overhead to a constant level,catering to users with limited computing resources.To precisely manage data access,the scheme implements dynamic accumulator technology,enabling data owners to grant or revoke access permissions to data requesters flexibly.Additionally,the generation of data requester access logs and the uploading of corresponding hash values to the blockchain efficiently prevent denial and tampering of data.Furthermore,the inclusion of regulatory bodies to evaluate and hold accountable data access requests further elevates the system’s trustworthiness and security.

    Through simulation experiments,the feasibility and superiority of the proposed strategy have been confirmed.Relative to existing solutions,the presented scheme exhibits significant advantages.However,the implementation of the current study has been confined to theoretical simulation due to resource constraints.Consequently,future research endeavors should focus on deploying the proposed strategy within real-world healthcare settings to further validate its effectiveness and practicality.

    Acknowledgement:This study was supported by the Natural Science Foundation of Hebei Province,China,under Project F2021201052.I would like to express my heartfelt gratitude to Professor Xiaohui Yang for his valuable guidance and support throughout this research.I also want to thank all the classmates who provided valuable suggestions for the experiments.Lastly,I am grateful to this esteemed journal for providing an opportunity for further learning.

    Funding Statement:Yang’s work was supported by the Natural Science Foundation of Hebei Province under Grant Number F2021201052.

    Author Contributions:The authors confirm contribution to the paper as follows: Study conception and design:Xiaohui Yang,Peiyin Zhao;data collection:Peiyin Zhao;analysis and interpretation of results:Xiaohui Yang,Peiyin Zhao;draft manuscript preparation:Peiyin Zhao.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The data that support the findings of this study are available from the corresponding author upon reasonable request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    啦啦啦啦在线视频资源| 国内少妇人妻偷人精品xxx网站| 看非洲黑人一级黄片| 九色成人免费人妻av| 卡戴珊不雅视频在线播放| 亚洲人与动物交配视频| 成人综合一区亚洲| 在线天堂最新版资源| 26uuu在线亚洲综合色| av在线天堂中文字幕| 高清欧美精品videossex| 国产精品久久久久久久久免| 十八禁网站网址无遮挡 | 中文字幕人妻熟人妻熟丝袜美| 亚洲欧美日韩东京热| 日产精品乱码卡一卡2卡三| 各种免费的搞黄视频| 王馨瑶露胸无遮挡在线观看| 干丝袜人妻中文字幕| 免费av观看视频| 在线观看av片永久免费下载| 一边亲一边摸免费视频| 亚洲人与动物交配视频| 老女人水多毛片| 人人妻人人看人人澡| 国产综合懂色| 日韩欧美一区视频在线观看 | 日韩大片免费观看网站| 亚洲国产av新网站| 视频区图区小说| 1000部很黄的大片| 全区人妻精品视频| 亚洲三级黄色毛片| 赤兔流量卡办理| 日日摸夜夜添夜夜添av毛片| 亚洲性久久影院| 岛国毛片在线播放| 黄色一级大片看看| 色综合色国产| 午夜福利在线观看免费完整高清在| 亚洲精品亚洲一区二区| 精品久久国产蜜桃| 久久精品久久久久久久性| 人人妻人人看人人澡| 日韩av在线免费看完整版不卡| 又粗又硬又长又爽又黄的视频| 六月丁香七月| 成年人午夜在线观看视频| 国语对白做爰xxxⅹ性视频网站| 男插女下体视频免费在线播放| 老师上课跳d突然被开到最大视频| 久久女婷五月综合色啪小说 | 免费黄色在线免费观看| 久久精品国产亚洲av涩爱| av播播在线观看一区| 欧美一区二区亚洲| 午夜精品国产一区二区电影 | 激情 狠狠 欧美| 国产 精品1| 免费人成在线观看视频色| 亚洲精品aⅴ在线观看| 国产成人精品婷婷| 亚洲欧美日韩另类电影网站 | 人人妻人人澡人人爽人人夜夜| 久久久久精品久久久久真实原创| 男插女下体视频免费在线播放| 观看免费一级毛片| 午夜福利高清视频| 一级毛片久久久久久久久女| 中文字幕亚洲精品专区| 欧美区成人在线视频| www.色视频.com| 成人无遮挡网站| 亚洲av在线观看美女高潮| 亚洲色图av天堂| 久久久成人免费电影| 国模一区二区三区四区视频| 99热这里只有是精品50| 九九在线视频观看精品| 精品国产一区二区三区久久久樱花 | 国产爽快片一区二区三区| 亚洲精品乱码久久久v下载方式| 久久久久久久亚洲中文字幕| 看黄色毛片网站| 黄色一级大片看看| 日日啪夜夜撸| 亚洲国产av新网站| 视频中文字幕在线观看| 高清欧美精品videossex| 日本三级黄在线观看| 熟女av电影| 岛国毛片在线播放| 22中文网久久字幕| 精华霜和精华液先用哪个| 日韩制服骚丝袜av| 亚洲天堂av无毛| 亚洲怡红院男人天堂| 一级片'在线观看视频| 亚洲av一区综合| 日韩欧美精品免费久久| 午夜激情福利司机影院| 亚洲av不卡在线观看| 99久久人妻综合| 看黄色毛片网站| h日本视频在线播放| 日韩欧美 国产精品| 精品久久久久久久久亚洲| 大片电影免费在线观看免费| 国产精品久久久久久av不卡| 成年女人在线观看亚洲视频 | 干丝袜人妻中文字幕| 国产毛片a区久久久久| 亚洲欧美成人综合另类久久久| 欧美成人一区二区免费高清观看| 国产一区有黄有色的免费视频| 寂寞人妻少妇视频99o| 国产黄a三级三级三级人| 最近的中文字幕免费完整| 日韩在线高清观看一区二区三区| 少妇人妻 视频| 国语对白做爰xxxⅹ性视频网站| 精品一区二区三卡| av国产免费在线观看| 少妇猛男粗大的猛烈进出视频 | 丰满乱子伦码专区| 99热这里只有精品一区| 两个人的视频大全免费| 91在线精品国自产拍蜜月| 内地一区二区视频在线| 国产免费福利视频在线观看| av在线天堂中文字幕| 99热这里只有精品一区| 日韩人妻高清精品专区| 欧美zozozo另类| av黄色大香蕉| 免费高清在线观看视频在线观看| 97热精品久久久久久| 在线观看一区二区三区激情| 日韩欧美精品v在线| 免费观看无遮挡的男女| 亚洲丝袜综合中文字幕| 男女下面进入的视频免费午夜| 欧美bdsm另类| 国产精品女同一区二区软件| av黄色大香蕉| 亚洲欧美精品专区久久| 最后的刺客免费高清国语| 男人添女人高潮全过程视频| 在线观看一区二区三区| 国产亚洲精品久久久com| 人人妻人人看人人澡| 欧美日韩精品成人综合77777| 18禁在线无遮挡免费观看视频| 99热这里只有是精品50| 婷婷色综合大香蕉| 亚洲国产精品成人久久小说| 亚洲色图av天堂| 国产成人精品婷婷| 亚洲av不卡在线观看| 国产精品久久久久久久电影| 国产综合精华液| 99热这里只有精品一区| 亚洲精品久久久久久婷婷小说| av在线播放精品| tube8黄色片| 91午夜精品亚洲一区二区三区| 国产高清有码在线观看视频| tube8黄色片| 蜜臀久久99精品久久宅男| 一二三四中文在线观看免费高清| 久久精品熟女亚洲av麻豆精品| 亚洲欧美日韩无卡精品| 91久久精品国产一区二区成人| av在线老鸭窝| 久久国产乱子免费精品| 久久久久网色| 欧美人与善性xxx| 国产成人免费观看mmmm| 三级国产精品片| 女人久久www免费人成看片| 亚洲国产欧美在线一区| 久久精品久久久久久久性| 色网站视频免费| 精品一区在线观看国产| 新久久久久国产一级毛片| 亚洲精品乱码久久久久久按摩| 69人妻影院| 观看免费一级毛片| 精品久久久久久久久亚洲| 大香蕉97超碰在线| 国产探花极品一区二区| 国产男女内射视频| 欧美成人精品欧美一级黄| 狠狠婷婷综合久久久久久88av| 国产亚洲最大av| 亚洲美女搞黄在线观看| 汤姆久久久久久久影院中文字幕| 日韩免费高清中文字幕av| 久久久欧美国产精品| 操出白浆在线播放| 热re99久久国产66热| 美国免费a级毛片| 国产福利在线免费观看视频| 久久性视频一级片| 国产亚洲欧美精品永久| 啦啦啦在线免费观看视频4| 啦啦啦啦在线视频资源| 美女午夜性视频免费| 夫妻性生交免费视频一级片| 两性夫妻黄色片| 搡老乐熟女国产| 国产精品久久久久久精品电影小说| 午夜福利视频在线观看免费| 美女高潮到喷水免费观看| 黄片无遮挡物在线观看| 黑人猛操日本美女一级片| 欧美国产精品va在线观看不卡| 国产亚洲精品第一综合不卡| 美女脱内裤让男人舔精品视频| 精品国产一区二区久久| 中文字幕av电影在线播放| 国产精品蜜桃在线观看| 午夜福利视频在线观看免费| 19禁男女啪啪无遮挡网站| 亚洲欧美一区二区三区黑人| 日本av免费视频播放| 两个人看的免费小视频| 国产乱来视频区| 欧美黑人精品巨大| 满18在线观看网站| 亚洲一级一片aⅴ在线观看| 午夜福利视频精品| 999精品在线视频| 午夜福利一区二区在线看| 国产福利在线免费观看视频| 在线观看三级黄色| 成年人午夜在线观看视频| 在线观看人妻少妇| 高清黄色对白视频在线免费看| 又粗又硬又长又爽又黄的视频| 老司机深夜福利视频在线观看 | 国产日韩欧美亚洲二区| 19禁男女啪啪无遮挡网站| 观看av在线不卡| 国产精品女同一区二区软件| 水蜜桃什么品种好| 亚洲国产毛片av蜜桃av| 国产免费现黄频在线看| 菩萨蛮人人尽说江南好唐韦庄| 大片免费播放器 马上看| 狠狠精品人妻久久久久久综合| 亚洲成av片中文字幕在线观看| 两性夫妻黄色片| 久久97久久精品| 十八禁高潮呻吟视频| 欧美日韩综合久久久久久| 美女扒开内裤让男人捅视频| 亚洲欧美色中文字幕在线| 欧美人与性动交α欧美精品济南到| 下体分泌物呈黄色| 亚洲国产精品一区二区三区在线| 女人爽到高潮嗷嗷叫在线视频| 人人妻人人爽人人添夜夜欢视频| 精品一区在线观看国产| 亚洲精品久久成人aⅴ小说| 国产精品秋霞免费鲁丝片| 性色av一级| 国产免费福利视频在线观看| netflix在线观看网站| 国产又色又爽无遮挡免| 一边亲一边摸免费视频| 国产又爽黄色视频| 可以免费在线观看a视频的电影网站 | 欧美精品人与动牲交sv欧美| 久久精品亚洲熟妇少妇任你| 精品国产一区二区三区久久久樱花| 黄色怎么调成土黄色| 一区福利在线观看| 色综合欧美亚洲国产小说| 老熟女久久久| 少妇人妻 视频| 亚洲成人一二三区av| 亚洲精品aⅴ在线观看| 99九九在线精品视频| 捣出白浆h1v1| 日韩成人av中文字幕在线观看| 女人精品久久久久毛片| 欧美人与性动交α欧美软件| 国产一区二区激情短视频 | 亚洲国产中文字幕在线视频| 国产成人系列免费观看| 中国三级夫妇交换| 女人高潮潮喷娇喘18禁视频| 国产麻豆69| 国产精品久久久久久久久免| 国产 一区精品| 亚洲欧美一区二区三区国产| 亚洲一码二码三码区别大吗| 美国免费a级毛片| 91精品三级在线观看| 亚洲精品国产一区二区精华液| 91成人精品电影| 少妇人妻 视频| 美女视频免费永久观看网站| 日本av免费视频播放| 一二三四在线观看免费中文在| 国产伦人伦偷精品视频| 亚洲自偷自拍图片 自拍| 国产成人精品在线电影| 大片免费播放器 马上看| 捣出白浆h1v1| 一区二区三区四区激情视频| 看免费成人av毛片| 日日摸夜夜添夜夜爱| 男女床上黄色一级片免费看| 精品第一国产精品| 一本一本久久a久久精品综合妖精| 欧美另类一区| 午夜免费男女啪啪视频观看| 免费av中文字幕在线| 久久国产精品男人的天堂亚洲| 精品一区二区三区四区五区乱码 | 欧美av亚洲av综合av国产av | 久久天堂一区二区三区四区| 国产视频首页在线观看| 宅男免费午夜| 黄片播放在线免费| 欧美黄色片欧美黄色片| 国产日韩一区二区三区精品不卡| kizo精华| 黑人欧美特级aaaaaa片| 99国产精品免费福利视频| 中国国产av一级| 久久毛片免费看一区二区三区| 国产男女内射视频| 两个人免费观看高清视频| 日韩中文字幕视频在线看片| 搡老岳熟女国产| 日日撸夜夜添| 国产亚洲av片在线观看秒播厂| 精品久久久久久电影网| 精品亚洲乱码少妇综合久久| 日韩一卡2卡3卡4卡2021年| 自线自在国产av| 一区在线观看完整版| 亚洲精品在线美女| 亚洲熟女精品中文字幕| 久久久久久人人人人人| 午夜老司机福利片| 十八禁高潮呻吟视频| 亚洲美女视频黄频| 97在线人人人人妻| 日本vs欧美在线观看视频| 亚洲av在线观看美女高潮| 午夜老司机福利片| videos熟女内射| 亚洲av男天堂| 人人妻,人人澡人人爽秒播 | 青春草亚洲视频在线观看| 国产不卡av网站在线观看| 欧美国产精品一级二级三级| 国产在线一区二区三区精| 人体艺术视频欧美日本| 亚洲精品乱久久久久久| 秋霞在线观看毛片| 99精国产麻豆久久婷婷| 高清欧美精品videossex| 精品国产乱码久久久久久男人| 女人爽到高潮嗷嗷叫在线视频| 色网站视频免费| 日韩欧美精品免费久久| 亚洲欧美精品自产自拍| 亚洲一区中文字幕在线| 亚洲精品自拍成人| 妹子高潮喷水视频| 在线观看免费午夜福利视频| 人人妻,人人澡人人爽秒播 | 国产精品一区二区在线不卡| 国产精品二区激情视频| 精品一区二区三区av网在线观看 | 久久午夜综合久久蜜桃| 久久精品国产亚洲av涩爱| 亚洲精品久久午夜乱码| videosex国产| 欧美日韩国产mv在线观看视频| 天天添夜夜摸| 欧美国产精品va在线观看不卡| 久久精品国产亚洲av高清一级| 啦啦啦中文免费视频观看日本| 欧美变态另类bdsm刘玥| 一级片'在线观看视频| 国产精品香港三级国产av潘金莲 | 五月天丁香电影| 国产精品国产av在线观看| 免费久久久久久久精品成人欧美视频| 精品亚洲成国产av| 精品久久蜜臀av无| 久久久精品免费免费高清| 国产人伦9x9x在线观看| 老汉色av国产亚洲站长工具| 亚洲,一卡二卡三卡| 久久久国产精品麻豆| 中文字幕高清在线视频| 叶爱在线成人免费视频播放| 精品卡一卡二卡四卡免费| 久久国产精品大桥未久av| 日韩欧美精品免费久久| 男女下面插进去视频免费观看| 水蜜桃什么品种好| 91aial.com中文字幕在线观看| 妹子高潮喷水视频| 一区二区av电影网| 国产日韩欧美在线精品| av又黄又爽大尺度在线免费看| 日韩精品免费视频一区二区三区| 国产亚洲最大av| 一本一本久久a久久精品综合妖精| 日本爱情动作片www.在线观看| 女性生殖器流出的白浆| 亚洲自偷自拍图片 自拍| 国产精品一区二区在线观看99| 亚洲国产最新在线播放| 成年女人毛片免费观看观看9 | 蜜桃国产av成人99| 久久人人爽av亚洲精品天堂| 交换朋友夫妻互换小说| 最新在线观看一区二区三区 | 精品一区二区三区av网在线观看 | av女优亚洲男人天堂| 波野结衣二区三区在线| 不卡av一区二区三区| 国产欧美亚洲国产| 亚洲,一卡二卡三卡| 国产探花极品一区二区| 美女福利国产在线| 欧美最新免费一区二区三区| 午夜精品国产一区二区电影| 如日韩欧美国产精品一区二区三区| 777久久人妻少妇嫩草av网站| 最近最新中文字幕大全免费视频 | 午夜免费男女啪啪视频观看| 久久热在线av| 国产一区二区三区综合在线观看| 久久韩国三级中文字幕| 你懂的网址亚洲精品在线观看| 99久国产av精品国产电影| 男女下面插进去视频免费观看| 免费日韩欧美在线观看| 欧美精品一区二区大全| 日韩中文字幕欧美一区二区 | 高清不卡的av网站| 欧美日韩亚洲综合一区二区三区_| 无限看片的www在线观看| 亚洲精品aⅴ在线观看| 97精品久久久久久久久久精品| 国产极品天堂在线| 欧美日韩亚洲高清精品| 精品久久久久久电影网| 国产色婷婷99| 国产精品一区二区在线不卡| 国产一区二区三区综合在线观看| 美国免费a级毛片| 亚洲精品aⅴ在线观看| 黄网站色视频无遮挡免费观看| 午夜av观看不卡| 熟妇人妻不卡中文字幕| 可以免费在线观看a视频的电影网站 | 国产成人精品无人区| 最近2019中文字幕mv第一页| 波多野结衣一区麻豆| 亚洲美女搞黄在线观看| 大码成人一级视频| 宅男免费午夜| 黄色毛片三级朝国网站| 成年美女黄网站色视频大全免费| 少妇 在线观看| 欧美日韩视频精品一区| 亚洲少妇的诱惑av| 久久久精品94久久精品| 日韩av免费高清视频| 欧美激情 高清一区二区三区| 久久久久人妻精品一区果冻| 男女无遮挡免费网站观看| 日本vs欧美在线观看视频| 91精品国产国语对白视频| 国产成人啪精品午夜网站| 国产淫语在线视频| 又粗又硬又长又爽又黄的视频| 男人舔女人的私密视频| 制服丝袜香蕉在线| 最近手机中文字幕大全| 精品国产一区二区三区久久久樱花| 国产1区2区3区精品| 亚洲精品美女久久久久99蜜臀 | 别揉我奶头~嗯~啊~动态视频 | 亚洲精华国产精华液的使用体验| 中国三级夫妇交换| 中文字幕亚洲精品专区| 日韩av不卡免费在线播放| av电影中文网址| 精品人妻熟女毛片av久久网站| 夫妻午夜视频| 午夜影院在线不卡| 国产国语露脸激情在线看| 青春草国产在线视频| 男女下面插进去视频免费观看| 人妻人人澡人人爽人人| 欧美黄色片欧美黄色片| 亚洲综合色网址| 黄网站色视频无遮挡免费观看| 观看av在线不卡| 精品亚洲成国产av| 亚洲欧洲精品一区二区精品久久久 | 免费人妻精品一区二区三区视频| 韩国精品一区二区三区| svipshipincom国产片| 欧美日本中文国产一区发布| 老司机深夜福利视频在线观看 | 国产女主播在线喷水免费视频网站| 久久精品久久久久久久性| 操美女的视频在线观看| 欧美老熟妇乱子伦牲交| 99久久99久久久精品蜜桃| 中文天堂在线官网| 欧美成人精品欧美一级黄| 爱豆传媒免费全集在线观看| 国产毛片在线视频| 亚洲自偷自拍图片 自拍| 超色免费av| 国产亚洲精品第一综合不卡| 精品第一国产精品| 午夜福利在线免费观看网站| 一级a爱视频在线免费观看| 免费在线观看黄色视频的| 日韩精品免费视频一区二区三区| 亚洲 欧美一区二区三区| 亚洲七黄色美女视频| 丰满饥渴人妻一区二区三| 亚洲伊人久久精品综合| 少妇被粗大的猛进出69影院| 久久韩国三级中文字幕| 亚洲激情五月婷婷啪啪| 日日啪夜夜爽| 久久午夜综合久久蜜桃| 一级毛片黄色毛片免费观看视频| 亚洲熟女毛片儿| 少妇人妻久久综合中文| 久久久欧美国产精品| 嫩草影院入口| 亚洲精品久久久久久婷婷小说| 天天躁夜夜躁狠狠躁躁| 18禁裸乳无遮挡动漫免费视频| a级片在线免费高清观看视频| 精品卡一卡二卡四卡免费| 亚洲国产欧美一区二区综合| 久久99精品国语久久久| 男女午夜视频在线观看| 国产一区二区 视频在线| 99国产综合亚洲精品| 秋霞在线观看毛片| 免费不卡黄色视频| 18禁国产床啪视频网站| 国产精品久久久久成人av| 国产精品成人在线| 波多野结衣av一区二区av| 9色porny在线观看| 国产伦人伦偷精品视频| 欧美日韩亚洲高清精品| 欧美另类一区| 色网站视频免费| 性色av一级| 自拍欧美九色日韩亚洲蝌蚪91| 精品少妇黑人巨大在线播放| 一边摸一边抽搐一进一出视频| 99香蕉大伊视频| 精品一品国产午夜福利视频| 国产淫语在线视频| 久久女婷五月综合色啪小说| 一区二区三区乱码不卡18| 久久人妻熟女aⅴ| 日韩一区二区三区影片| 观看av在线不卡| 国产亚洲av片在线观看秒播厂| 中文精品一卡2卡3卡4更新| 午夜免费男女啪啪视频观看| 日本爱情动作片www.在线观看| 久久精品人人爽人人爽视色| 亚洲国产最新在线播放| 国产av精品麻豆| 大片免费播放器 马上看| 国产精品一区二区在线观看99| 一本久久精品| 国产成人精品久久二区二区91 | 中文字幕制服av| 又大又黄又爽视频免费| 在线观看人妻少妇| 男女边吃奶边做爰视频| 免费在线观看完整版高清| 久久精品久久精品一区二区三区| 叶爱在线成人免费视频播放| 国产片特级美女逼逼视频| 国产黄色免费在线视频| 18禁观看日本| 国产精品亚洲av一区麻豆 | 欧美国产精品一级二级三级| 人妻一区二区av| 大片免费播放器 马上看| 国产成人精品无人区| 在线观看www视频免费| 极品人妻少妇av视频| 一区福利在线观看| xxxhd国产人妻xxx| 精品国产一区二区三区久久久樱花| 午夜激情av网站| 观看av在线不卡|