• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于模糊算法的高维医学数据属性加密访问控制方法

Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm.

作者信息

Huang Yonggang, Teng Teng, Li Yuanyuan, Zhang Minghao

机构信息

Information Management, The First Affiliated Hospital of Hebei North University, Zhangjiakou, China.

出版信息

PLoS One. 2025 Mar 27;20(3):e0317119. doi: 10.1371/journal.pone.0317119. eCollection 2025.

DOI:10.1371/journal.pone.0317119
PMID:40146699
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11949373/
Abstract

The current approach to data access control predominantly utilizes blockchain technology. However, when dealing with high-dimensional medical data, the inherent transparency of blockchain conflicts with the necessity of protecting patient privacy. Consequently, this increases the risk of sensitive information exposure. To enhance patient privacy, a fuzzy encryption algorithm is employed. This prevents unauthorized access and decryption of sensitive medical data. Consequently, a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm is proposed. Phase data and frequency data are utilized to assess the stability of medical data attributes. Additionally, the empirical mode decomposition method is applied to eliminate noise from these attributes. Using the key configuration of fuzzy encryption algorithm, high-dimensional medical data attributes with different security levels within the same field undergo encryption and decryption processes. Moreover, the trust degree of access behavior towards these data attributes is calculated to maintain security. After the medical users successfully log in, their access permissions are analyzed to effectively control the encrypted access permissions of high-dimensional medical users. The access request graph is established to effectively control encrypted access to high-dimensional medical data attributes. The experimental results showed that when the number of data attributes reached millions, the encryption access control time was still less than 60ms. The maximum encryption time was reduced by 21ms, and the anti-attack success rate was high during the application process. From the comparison of the maximum success rates, it can be seen that the success rate of this method in resisting attacks has increased by 8.5%.

摘要

当前的数据访问控制方法主要利用区块链技术。然而,在处理高维医学数据时,区块链固有的透明度与保护患者隐私的必要性相冲突。因此,这增加了敏感信息暴露的风险。为了增强患者隐私,采用了一种模糊加密算法。这可以防止对敏感医学数据的未经授权访问和解密。因此,提出了一种基于模糊算法的高维医学数据属性加密访问控制方法。利用相位数据和频率数据来评估医学数据属性的稳定性。此外,应用经验模态分解方法来消除这些属性中的噪声。使用模糊加密算法的密钥配置,对同一字段内不同安全级别的高维医学数据属性进行加密和解密处理。此外,计算对这些数据属性的访问行为的信任度以维护安全性。医学用户成功登录后,分析其访问权限以有效控制高维医学用户的加密访问权限。建立访问请求图以有效控制对高维医学数据属性的加密访问。实验结果表明,当数据属性数量达到数百万时,加密访问控制时间仍小于60毫秒。最大加密时间减少了21毫秒,并且在应用过程中的抗攻击成功率很高。从最大成功率的比较可以看出,该方法在抗攻击方面的成功率提高了8.5%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/17253e4346e6/pone.0317119.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/2bcf8a708a96/pone.0317119.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/d23daad95a7f/pone.0317119.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/92f4fc807c6f/pone.0317119.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/404e1b9bfb7f/pone.0317119.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/f34ebcdf0469/pone.0317119.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/59dfd3620905/pone.0317119.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/7d32c956eb02/pone.0317119.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/f3356a0e8605/pone.0317119.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/1546d8ec2ccc/pone.0317119.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/fdcf9c7af2ad/pone.0317119.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/17253e4346e6/pone.0317119.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/2bcf8a708a96/pone.0317119.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/d23daad95a7f/pone.0317119.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/92f4fc807c6f/pone.0317119.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/404e1b9bfb7f/pone.0317119.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/f34ebcdf0469/pone.0317119.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/59dfd3620905/pone.0317119.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/7d32c956eb02/pone.0317119.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/f3356a0e8605/pone.0317119.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/1546d8ec2ccc/pone.0317119.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/fdcf9c7af2ad/pone.0317119.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/15cc/11949373/17253e4346e6/pone.0317119.g011.jpg

相似文献

1
Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm.基于模糊算法的高维医学数据属性加密访问控制方法
PLoS One. 2025 Mar 27;20(3):e0317119. doi: 10.1371/journal.pone.0317119. eCollection 2025.
2
Privacy Preservation in Patient Information Exchange Systems Based on Blockchain: System Design Study.基于区块链的患者信息交换系统中的隐私保护:系统设计研究。
J Med Internet Res. 2022 Mar 22;24(3):e29108. doi: 10.2196/29108.
3
Secure Collaborative Platform for Health Care Research in an Open Environment: Perspective on Accountability in Access Control.安全的开放环境下医疗保健研究协作平台:访问控制中的问责制视角。
J Med Internet Res. 2022 Oct 14;24(10):e37978. doi: 10.2196/37978.
4
Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products.基于区块链的农产品生物风险隐私保护代理重加密访问控制方法。
Sci Rep. 2024 Aug 29;14(1):20048. doi: 10.1038/s41598-024-70533-0.
5
HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications.HealthLock:物联网医疗应用中基于同态加密的区块链隐私保护
Sensors (Basel). 2023 Jul 28;23(15):6762. doi: 10.3390/s23156762.
6
Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage.基于区块链的去中心化存储中安全共享个人健康记录的访问控制方案。
Sensors (Basel). 2021 Apr 2;21(7):2462. doi: 10.3390/s21072462.
7
Blockchain-enabled data governance for privacy-preserved sharing of confidential data.支持区块链的数据治理,用于在保护隐私的前提下共享机密数据。
PeerJ Comput Sci. 2024 Dec 20;10:e2581. doi: 10.7717/peerj-cs.2581. eCollection 2024.
8
A robust algorithm for authenticated health data access via blockchain and cloud computing.一种通过区块链和云计算进行认证的健康数据访问的稳健算法。
PLoS One. 2024 Sep 23;19(9):e0307039. doi: 10.1371/journal.pone.0307039. eCollection 2024.
9
Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain.基于深度学习的医学图像加密方案:使用深度卷积生成对抗网络和虚拟星球域
Sci Rep. 2025 Jan 7;15(1):1211. doi: 10.1038/s41598-024-84186-6.
10
A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.基于错误的环学习密文策略属性基代理重加密方案,用于云环境中的安全大数据共享。
Big Data. 2024 Oct;12(5):357-366. doi: 10.1089/big.2021.0301. Epub 2022 Apr 11.

引用本文的文献

1
A Secure Medical Data Framework Integrating Blockchain and Edge Computing: An Attribute-Based Signcryption Approach.一种集成区块链和边缘计算的安全医疗数据框架:基于属性的签密方法。
Sensors (Basel). 2025 Apr 30;25(9):2859. doi: 10.3390/s25092859.