| With the development of technology,the development of digitalization and informatization of medicine is also showing an upward trend to varying degrees.At the same time,the advantages of E-medicine over traditional medical care are more obvious.The E-health system is the most representative system in E-medicine.However,in this era of big data sharing,users are more concerned about privacy and security issues in the process of using the system.To this end,researchers have also put forward a lot of their own views and ideas for solving these problems,and among them,attribute-based encryption is a more reliable and safe encryption method.At the same time,the emergence of attributebased encryption is also useful for solving users in electronic health systems.The issue of privacy and data security has opened up a new direction.However,there are still many problems when attribute-based encryption is applied in electronic health scenarios.For example,for economic benefits,some malicious users use the sharing feature of attribute-based encryption to illegally leak private keys on the sharing platform to sell sensitive data of patients.Or they construct a decryption device such as a black-box to provide decryption privileges to other users to illegally steal patient information.These will directly lead to the leakage of user privacy and make the user’s data no longer safe.In addition,when most patients use the E-health system,they hope that the encrypted and uploaded data can only be decrypted by designated users to ensure data security.In addition,when constructing an electronic health system,we also need to pay more attention to its practicality,that is,what functions should be provided in the real world.Therefore,this article proposes relevant solutions to the problems of key abuse,key escrow,and attribute revocation when using attribute-based encryption in E-health systems.1.In order to achieve fine-grained access control in fog application scenarios to ensure data security and user privacy,this paper proposes a new attribute-based encryption scheme(AR-CPABE)with outsourcing and attribute revocation functions,which aims to build a A fine-grained access control system(AC-FEH)based on fog com-puting under the electronic health system.In the system designed in this paper,thefog node is responsible for data encryption and decryption operations.Therefore,the computational cost of data owners and users is minimized,and the selective security of the scheme is also proved.2.Traditional attribute-based encryption schemes often fail to consider the complex-ity and importance of attributes in real-world scenarios,and at the same time ig-nore the fact that third parties are not completely credible in practice.This paper uses the idea of weighted attributes,by dividing the attributes according to certain weights,and transforming the segmented sets into weighted attribute segmentation sets,which makes the complex and diverse attribute structure clearer and improves the flexibility of system attribute expression.Therefore,this paper proposes an encryption scheme(TKEFW-ABE)with black box tracking function and no key es-crow based on weight attributes in the context of cloud computing.Compared with other schemes,the encryption and decryption cost of this scheme is relatively small.And this article proves the safety of the scheme under the standard model. |