Font Size: a A A

Research On Cloud-assisted Telemedicine Data Possession Proof Scheme

Posted on:2022-04-24Degree:MasterType:Thesis
Country:ChinaCandidate:L H JiangFull Text:PDF
GTID:2514306539453154Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Due to the promotion of national policies and medical advances,the application of national health informatization has been vigorously developed and promoted,and the medical data shows a vigorous growth trend.However,the limited storage space of existing medical equipment is not conducive to the long-term preservation of data.In order to give full play to the value of medical data,cloud storage of medical data becomes a necessity,which gives birth to the development of “Internet plus medicine” and promotes a new cloud-assisted telemedicine model.However,the new data storage model brings potential risks.As the core security issue of cloud storage,data integrity has always been concerned.Especially when the data stored in the cloud is related to people's life and health,any data leakage and loss may cause serious liability accidents.In this case,it is necessary to implement a provable data possession scheme to determine whether the cloud data is correctly and completely stored.At present,the provable data possession protocols mainly rely on the third party,namely auditing,which puts forward high requirements in terms of security,efficiency and function.However,few schemes involve the special scenario of cloud-assisted telemedicine.Therefore,this paper fully considers the specific medical scenarios,and follows the research ideas from single user to group user participating in data dynamic operation,from probability auditing to complete auditing.In addition,this paper studies the provable data possession scheme with the following extended functions: supporting user identity privacy protection,sensitive information hiding,data dynamic operation,user revocation,key-exposure resistance,etc.The specific research contents are as follows:1.Aiming at the problem that patient's identity privacy is easily disclosed in the provable data possession scheme,this paper proposes a provable data possession protocol that supports one-way anonymous authentication between patients and medical personnel in cloud-assisted telemedicine environment,so as to realize privacy protection of patients' personal information.In addition,the scheme supports the hiding of sensitive information in patient data and the shareability of the data.Furthermore,this paper proposes a stereo storage structure for storing medical data,which helps to solve the problems of large volume and variety of medical data in the cloud.This structure can realize the fast search of medical data in the cloud,save the storage cost of index table,and provide the basic support for efficient provable data possession protocols.Finally,the security and performance of the designed protocol are analyzed,and the security and lightweight overhead of the scheme are proved.2.In view of the fact that the existing provable data possession scheme cannot meet the requirements of light and complete auditing of medical data,this paper proposes a concept of bi-auditing.In this primitive,the medical side realizes more accurate probability auditing based on data blocks,and the patient side realizes complete auditing of the whole medical data.On this basis,the protocol further expands the different functions of the patient side and the medical side,and strengthens the security of the provable data possession scheme.In addition,to solve the problem that the existing dynamic data structure is difficult to support the dynamic auditing of frequently updated medical data,this paper designs a new bi-auditing hash tree and hash forest structure.The structure can effectively support the following functions: full dynamic operation of data by group medical personnel,recovering the usability of the tags generated by the revoked users for the modified data with light cost,patient side constant auditing metadata and lightweight batch auditing.Finally,the security analysis and performance analysis prove the security and efficiency of the scheme.
Keywords/Search Tags:cloud storage, provable data possession, bi-auditing, data dynamic operation
PDF Full Text Request
Related items