移動醫(yī)療中隱藏訪問結構的云外包屬性基加密
發(fā)布時間:2018-01-15 18:29
本文關鍵詞:移動醫(yī)療中隱藏訪問結構的云外包屬性基加密 出處:《西安電子科技大學》2015年碩士論文 論文類型:學位論文
更多相關文章: 移動醫(yī)療數(shù)據(jù) 基于屬性加密 云外包 隱藏訪問結構
【摘要】:近些年智能手機的普及為可穿戴設備的發(fā)展提供了支撐,谷歌眼鏡、智能手環(huán)、智能手表等等智能可穿戴設備正飛速的走進我們的視野。這些可穿戴設備的廣泛應用正逐步改變傳統(tǒng)的醫(yī)療方式。可穿戴設備為人們帶來了更健康的生活方式,同時也為醫(yī)護人員對于病癥的根源提供更多的健康數(shù)據(jù)。但是其隱私安全卻成為一個回避不了的問題。醫(yī)學數(shù)據(jù)(譬如指紋,虹膜,DNA等)的泄露通常比個人基本信息的泄露具有更大的隱患。而且在移動醫(yī)療過程中需要使用該醫(yī)療數(shù)據(jù)的往往是具有特定屬性特征的人群(例如某一類專家),所以在可穿戴醫(yī)療設備上數(shù)據(jù)的加密適合采取基于屬性的加密技術。但在實際應用中經(jīng)常為了達到細粒度的訪問控制,密文的訪問控制策略一般也會隨之變得更加復雜,導致其對應的解密開銷也會隨之急速增加,而用戶設備(智能手機,筆記本電腦等)并不一定能夠承受如此耗時的計算等待。針對這個問題,我們可以將該解密過程外包給云計算。但是現(xiàn)有的云外包方案對于使用者屬性的保護不足。也就是說我們可以通過存儲在云端的訪問結構知道哪些人可以訪問該數(shù)據(jù),以及訪問者的屬性信息。所以我們針對移動醫(yī)療中的這種情況在前人研究的基礎上提出了全新的隱藏訪問結構的基于屬性加密的云外包。本文的主要內(nèi)容如下:1、分析了可穿戴設備的研究背景和發(fā)展現(xiàn)狀,并對其發(fā)展前景進行了一定的展望,隨后將其中關于隱私保護方面主要存在的一些問題進行了重點的分析和討論,引出我們的解決方案。2、介紹基于身份加密的研究背景和現(xiàn)狀。而基于屬性加密則是基于身份加密的進一步發(fā)展,其將唯一性標識用模糊化的屬性集合標示,這些屬性集合由一個或多個屬性組成。接著介紹了基于屬性加密的相關技術理論和研究背景。3、本文針對移動醫(yī)療數(shù)據(jù)屬性的敏感性提出了一個密文策略的隱藏訪問結構的基于屬性加密的云外包方案。該方案在素數(shù)群中提出了一個具有隱藏訪問結構功能的基于屬性加密技術,然后再將其外包給云服務器,充分的保障了用戶數(shù)據(jù)以及用戶身份本身的安全。最后我們通過形式化證明,證明了該方案的正確性,并對方案進行了安全性證明,以及計算開銷和通信開銷作出相應分析并與其他的基于屬性加密方案進行了對比。最終,我們證明了本方案的可行性,并對移動醫(yī)療未來的發(fā)展前景給出了相關分析。
[Abstract]:In recent years, the popularity of smartphones has provided support for the development of wearable devices, Google Glass, smart bracelet. Smart wearable devices, such as smart watches, are rapidly coming into our view. The wide application of these wearables is gradually changing the traditional medical methods. Wearable devices have brought people a healthier way of life. It also provides more health data for health care workers on the root causes of the disease. But their privacy is an unavoidable issue. Medical data (such as fingerprints, iris). (DNA et al.) leaks are usually more dangerous than the disclosure of basic personal information. And it is often the population with specific attributes that needs to use the medical data in the mobile medical process (. For example, a particular category of experts. Therefore, the encryption of data on wearable medical devices is suitable for the use of attribute-based encryption technology, but in practical applications, it is often used to achieve fine-grained access control. The access control strategy of ciphertext will become more complex, resulting in the corresponding decryption costs will increase rapidly, and user devices (smart phones). Notebook computers, etc.) are not necessarily able to withstand such time-consuming computational wait. To address this problem. We can outsource the decryption process to cloud computing, but the existing cloud outsourcing scheme does not protect consumer properties. That is to say, we can know who can access it by using the access structure stored in the cloud. Data. Therefore, we propose a new hidden access structure based on attribute encryption cloud outsourcing. The main contents of this paper are as follows:. 1. This paper analyzes the research background and development status of wearable devices, and gives a certain prospect of its development, and then analyzes and discusses the main problems in privacy protection. This paper introduces our solution. 2, introduces the background and current situation of ID-based encryption, while attribute-based encryption is the further development of ID-based encryption, which marks unique identity with fuzzy attribute set. These attribute sets are composed of one or more attributes. Then, the related technology theory and research background based on attribute encryption are introduced. 3. In this paper, we propose a hidden access structure based on attribute encryption for the sensitivity of mobile medical data attributes. In this scheme, we propose a hidden access structure with the function of hidden access structure in prime group. Attribute based encryption technology. Then it is outsourced to the cloud server, which fully guarantees the security of user data and user identity. Finally, we prove the correctness of the scheme through formal proof. The security proof of the scheme and the corresponding analysis of computational overhead and communication overhead are given and compared with other attribute-based encryption schemes. Finally, we prove the feasibility of this scheme. The future development of mobile medicine is analyzed.
【學位授予單位】:西安電子科技大學
【學位級別】:碩士
【學位授予年份】:2015
【分類號】:TN918.4
【相似文獻】
相關期刊論文 前3條
1 大豆腐;花季信箱[J];現(xiàn)代技能開發(fā);1998年06期
2 任曉霞;黃宏宇;;安全高效的大矩陣行列式計算云外包協(xié)議[J];計算機工程與應用;2014年10期
3 ;[J];;年期
相關重要報紙文章 前1條
1 煥之;“六招”調(diào)節(jié)不良情緒[N];山西經(jīng)濟日報;2003年
相關碩士學位論文 前1條
1 曹磊;移動醫(yī)療中隱藏訪問結構的云外包屬性基加密[D];西安電子科技大學;2015年
,本文編號:1429557
本文鏈接:http://sikaile.net/kejilunwen/wltx/1429557.html
最近更新
教材專著