Skip to main navigation Skip to search Skip to main content

Verifiable Conjunctive Field Keyword Searchable Encryption With Aggregate Keys for E-Health Cloud

  • East China Normal University

Research output: Contribution to journalArticlepeer-review

Abstract

With the rapid proliferation of Internet of Things (IoT)-enabled healthcare systems, sensitive data, such as electronic health records (EHRs) are increasingly outsourced to semi-trusted e-health clouds, raising critical concerns about privacy and verifiability. This article investigates secure and efficient keyword-based data retrieval in such environments. key-aggregate searchable encryption (KASE) enables a data owner to share multiple encrypted documents with users using a single compact key, but existing schemes offer limited resistance to offline keyword guessing attacks (KGA) and insufficient protection against keyword privacy leakage. To systematically expose broader vulnerabilities in existing KASE constructions, we present a novel and general attack, termed expanded inside trapdoor attack (EITA), which targets both the security of aggregate keys and the privacy of keywords in unauthorized documents. Furthermore, flexible search methods and result verification are essential for improving KASE performance. To this end, we propose a new KASE scheme that supports conjunctive queries and employs aggregate signatures for verification, while being able to resist KGA and EITA. The security analysis and performance evaluation both demonstrate that our proposed scheme is provably secure and practically efficient in IoT-enabled healthcare settings.

Original languageEnglish
Pages (from-to)46985-46999
Number of pages15
JournalIEEE Internet of Things Journal
Volume12
Issue number22
DOIs
StatePublished - 2025

Keywords

  • Conjunctive query
  • electronic health record (EHR)
  • inside trapdoor attack (ITA)
  • key-aggregate searchable encryption (KASE)
  • verifiable

Fingerprint

Dive into the research topics of 'Verifiable Conjunctive Field Keyword Searchable Encryption With Aggregate Keys for E-Health Cloud'. Together they form a unique fingerprint.

Cite this