透過您的圖書館登入
IP:3.144.212.145
  • 學位論文

電子病歷系統的動態且有效率之完整性檢測暨實作可搜尋的對稱式加密系統

Dynamic and Efficient Provable Data Possession for Electronic Health Record System & Symmetric Searchable Encryption Implementation

指導教授 : 曾文貴

摘要


隨著雲端儲存的興起,病人為了方便管理個人的病歷資料會選擇將病歷儲存在雲端在伺服器上。這就存在一個問題:假設這些提供儲存的伺服器是不可信任的情況下,我們如何確保放在伺服器上的電子病歷未被竄改呢? Ateniese等人提出Provable Data Possession (PDP)此協定來幫助使用者驗證儲存在不可信任的伺服器中的資料。在他們的協定中使用者會事先根據資料(通常代表一個檔案)計算出驗證使用的metadata後,將資料以及metadata送至伺服器上,接著使用者可以刪除使用者端的資料。使用者只要保留一些機密資訊就可以有很高的機率可以驗證放在伺服器上的資料正確性。然而PDP驗證只能針對靜態的資料。此外PDP是採用公開金鑰的方式,驗證以及證明的計算時間比較長。因此我們提出的方法考量到計算時間而採用HMAC的方式做驗證,除此之外,我們的方法還能支援修改病歷的操作。同時我們也實作了一套能讓使用者檢查病歷完整性的電子病歷系統。 使用者倘若將資料儲存在不可信任的伺服器中,為了保護其機密性,儲存在伺服器中的資料皆以加密方式保護。使用者上傳資料後,日後如果想搜尋在雲端上它儲存了哪些資料,由於資料已經加密過,並不能直接對密文搜尋。因此我們參考Curtmola等人提出的Searchable Symmetric Encryption(SSE)的架構,實作了一個能在對稱式加密檔案中作關鍵字搜尋的系統,並且提供使用者能下載與搜尋結果相關的檔案。同時也對我們系統作效能的分析。

並列摘要


We propose a data integrity check scheme for electronic health record system. In our scheme, the patient can check the integrity of his health records when he finished uploading his health records. Obviously, our scheme is based on HMAC, so the computing time of the proof and the verification in our scheme is short. Our scheme also allows the patient to modify his health records on the server. In the end, we design a testing EHR system which allows the patient to check the correctness of his health records. We consider that the user may outsource his files to the server. To protect the confidentiality of his files, the user will outsource his files with encrypted form. As a result, the user can’t search over the encrypted files easily. Searchable symmetric encryption (SSE) allows the user to outsource the storage of his data to the server in a private manner, while maintaining the ability to selectively search over it. We build a keyword-searching system based on SSE scheme. Our system also allows the user to download the encrypted files associated with the search result. Last, we analyze the performance of our system.

參考文獻


[3] Hovav Shacham and Brent Waters. Compact proofs of retrievability. In ASIACRYPT, 2008.
[5] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847–859, 2011.
[6] Kan Yang and Xiaohua Jia. "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing." (2012): 1-1.
[8] Ralph C. Merkle, “Protocols for Public Key Cryptosystems,” Proc. IEEE Symp. Security and Privacy, pp. 122-133, 1980.
[9] Dawn Xiaodong Song, David Wagner, and Adrian Perrig. Practical techniques for searching on encrypted data. In IEEE Symposium on Security and Privacy, pages 44–55, May 2000.

延伸閱讀