Page 72 - Read Online
P. 72

Jiang et al. J Surveill Secur Saf 2020;1:61-78  I  http://dx.doi.org/10.20517/jsss.2020.09                                          Page 65

               the security model of the proposed one-way anonymous auditing protocol. In Section 5, a detailed
               description of the proposed scheme is demonstrated. After that, a security analysis is presented in Section 6.
               In addition, performance analysis of our stereo storage structure assisted one-way anonymous auditing
               protocol in e-health system is given in Section 7. Finally, Section 8 concludes the findings of the paper.

               2  PRELIMINARIES
               Necessary preliminaries mainly including some definitions and basic properties about bilinear pairing and
               one-way anonymous key agreement required for this paper are introduced in this section.

               2.1  Bilinear pairing
               Let G  and G  be two groups of the same prime order q. Let G  be an additive group, and let G  be a
                                                                        1
                                                                                                     2
                           2
                    1
                                                          2
               multiplicative group. A mapping e on (G , G ): G  → G  satisfying the following properties is named a

                                                      2
                                                   1
                                                                2
                                                          1
                                      [28]
               cryptographic bilinear map .
               2.1.1 Bilinearity
                            )
                                                   *
                             ab
                                             ab
                ( e aP ,bQ ) = e ( ,P Q for all , ∈GPQ  1and , ∈ Z . This can be expressed in the following manner. For ,, ∈GPQ R  1 ,
                                                   q
                                                 ( ,) ( ,)R e Q R .
                ( + eP Q R  eP              ,) =  eP      − 1
                     ,) =
                          ( ,) ( ,)R e Q R and ( − eP Q R
               2.1.2  Non-degeneracy
               If is a generator of G , then e( P ,  P ) is a generator of G . That is to say, e( P ,  P ) ≠ 1.
                 P
                                                              2
                                  1
               2.1.3  Computability
               e is efficiently computable.
               2.2  One-way anonymous key agreement
                                                                        [29]
               One-way anonymous key agreement was proposed by Kate et al. . Suppose Alice ID  and Bob ID are
                                                                                          A
                                                                                                      B
                                                                                 .
               clients of the same key generation center, whose master secret is s and d = s   H(ID) for clients with their
                                                                             i
                                                                                       i
               identity ID. Then, clients can compute a shared key by using their own privacy key and the identity ID
               of the other participant. What is more, suppose Alice wants to remain anonymous with Bob. Hereafter,
               the key agreement protocol process can be roughly divided into the following two parts: (1) first, Alice
                                               )
               computes Q A  = H (ID and Q B  = H  (ID . Finally, randomly chooses an integer r A  ∈ Z , computes P A  = rQ A
                                                                                       *
                                 )
                                                                                                       ⋅
                                A
                                                                                     R
                                                                                                      A
                                                                                       q
                                              B
                                                                                                         )
                                                                                                      ,
               as Alice’s pseudonym and sends it to Bob; (2) after received Alice’s pseudonym, Bob computes K AB  =  ( eP d .
                                                                                                     A
                                                                                                        B
               Then, Alice and Bob have the same shared key K AB  =  ( e d A ,Q B ) = eQ A ,Q B )  A rs ⋅  = e ( ,P d B ).
                                                                      (
                                                                                   A
               3  SYSTEM MODEL AND DATA STRUCTURE
               3.1  System model
               Stereo storage structure assisted one-way anonymous auditing scheme in e-health system involves four
               entities: key generation center, users, the third-party auditor, and cloud server. Figure 1 illustrates the
               relationship between those four entities.
               3.1.1  User
               In our model, patients and physicians are considered as the two main electronic health system (EHS)-
               related personnel types. For instance, when a patient seeks a diagnosis through interview by a physician in
               EHS, the patient needs to inform the physician of his or her own information at first. To realize the privacy
               protection of the patient’s identity, our scheme will set up a false name for the patient based on the patient’s
               identity ID to interact with the physician. A physician needs to generate patients’ electronic health records
               (EHRs), which contains basic information about the physician and the patient as well as the patient’s
               medical data, and upload it to the cloud. Although physicians and patients are two different entities, their
   67   68   69   70   71   72   73   74   75   76   77