| In recent years, the popularity of smart phones can provide support for the development of wearable devices. Google glasses, smart bracelet, smart watches and so smart wearable devices are also being rapidly into our vision.These wearable devices are gradually changing the traditional medical way.Wearable devices bring a more healthy lifestyle for people, and provide more data for the root causes of health disorders for the medical staff. However at the same time they also face the problem of storage security and privacy security. Leakage of medical data (such as fingerprints, iris, DNA, etc.) generally have a greater risk disclosure than the leakage of personal information.And the use of medical data in mobile medical process is often have specific attributes of the population (e.g. a certain class of experts), so taking attribute based encryption is more suitable in wearable medical devices on data encryption. But in order to achieve the purpose of fine-grained access control ciphertext access control policy will becomes complex. It leads to the corresponding decryption cost also increase, and user equipment (intelligent mobile phone, laptop, etc.) does not bear so much time waiting. To solve this problem, we can outsource the decryption process to cloud computing. But the existing cloud outsourcing scheme can not effectively protect the users’attributes. That is, we can know who can access the data through the storage of the structure of the cloud, and the attribute information of the visitors.So we have proposed a new hidden access structure based on the property encryption of the cloud outsourcing based on previous studies.The main contents of this paper are as follows:1. We analyze the research background and development status of the wearable device.Then we analyzed some questions about the main aspects of privacy protection and proposed our solution.2. We introduce the background and significance of identity encryption and its research status. And attribute based encryption is a generalization of the concept of user identity identifier as a collection of attributes, which is composed of one or more attributes. Then we introduce the theory and background of the related technology based on attribute encryption..3. In this paper, we proposed a attributes based encryption based cloud outsourcing scheme for the sensitivity of mobile medical data. The scheme proposed a attribute based encryption technology hidden access structure in the prime group and then outsource it to the cloud server,that sufficiently protect the security of user’s data and user’s identity itself. Finally, we proved the correctness of the scheme by formal proof and the security of the scheme. In the end, we proved the feasibility of this project, and gave the relevant analysis of the future development of mobile medical. |