Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm

  • Yonggang Huang ,

    Roles Conceptualization, Project administration, Writing – original draft

    h154392275@163.com

    Affiliation Information Management, The First Affiliated Hospital of Hebei North University, Zhangjiakou, China

  • Teng Teng,

    Roles Data curation, Methodology, Validation

    Affiliation Information Management, The First Affiliated Hospital of Hebei North University, Zhangjiakou, China

  • Yuanyuan Li,

    Roles Investigation, Software, Writing – review & editing

    Affiliation Information Management, The First Affiliated Hospital of Hebei North University, Zhangjiakou, China

  • Minghao Zhang

    Roles Formal analysis, Resources, Software, Supervision

    Affiliation Information Management, The First Affiliated Hospital of Hebei North University, Zhangjiakou, China

Abstract

The current approach to data access control predominantly utilizes blockchain technology. However, when dealing with high-dimensional medical data, the inherent transparency of blockchain conflicts with the necessity of protecting patient privacy. Consequently, this increases the risk of sensitive information exposure. To enhance patient privacy, a fuzzy encryption algorithm is employed. This prevents unauthorized access and decryption of sensitive medical data. Consequently, a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm is proposed. Phase data and frequency data are utilized to assess the stability of medical data attributes. Additionally, the empirical mode decomposition method is applied to eliminate noise from these attributes. Using the key configuration of fuzzy encryption algorithm, high-dimensional medical data attributes with different security levels within the same field undergo encryption and decryption processes. Moreover, the trust degree of access behavior towards these data attributes is calculated to maintain security. After the medical users successfully log in, their access permissions are analyzed to effectively control the encrypted access permissions of high-dimensional medical users. The access request graph is established to effectively control encrypted access to high-dimensional medical data attributes. The experimental results showed that when the number of data attributes reached millions, the encryption access control time was still less than 60ms. The maximum encryption time was reduced by 21ms, and the anti-attack success rate was high during the application process. From the comparison of the maximum success rates, it can be seen that the success rate of this method in resisting attacks has increased by 8.5%.

1. Introduction

With the rapid development of medical information technology, an increasing number of medical institutions collect and store a vast amounts of high-dimensional medical data [1]. High-dimensional medical data refers to data collected in the medical field containing multiple characteristics (dimensions), including patient identity information (such as age, gender, race, family status), disease status (such as disease type, severity, course of disease), and drug use (such as drug type, dose, frequency) [2]. Medical data attributes can be broadly categorized into two types: qualitative and quantitative. Qualitative attributes are those that possess classification or labeling properties, such as gender and disease type, which describe categorical characteristics. Conversely, quantitative attributes are those that carry numerical values, like age and drug dosage, providing measurable quantities. Additionally, medical data attributes include “stage” and “frequency,” which specify the time frame and the rate of data collection, respectively. These attributes are essential for accurately recording the condition of patients at various stages [3]. However, the security and privacy protection of these high-dimensional medical data are confronting significant challenges. During the collection, processing, and integration of high-dimensional medical data, various noise interferences may arise. These include data errors stemming from human input mistakes and equipment malfunctions during the data collection phase. In the subsequent data cleaning and processing stage, algorithm or operational errors may emerge, thereby introducing additional noise. Moreover, inconsistencies in data sources during data fusion can also lead to noise interference. The primary impact of such noise is a decrement in data quality [4]. Noise interference makes high-dimensional medical data inaccurate and unreliable, affecting the accuracy of medical decision-making. In data analysis, if noise is not effectively eliminated, it can lead to incorrect conclusions and inaccurate predictions. In addition, noise increases the difficulty of data processing and analysis, reducing the interpretability and reliability of data [5]. The sharing and interoperability of medical data have enormous potential in promoting collaborative healthcare, facilitating medical research, and strengthening public health. However, this process is not without challenges, primarily concerning data security and privacy protection [6]. Therefore, it is urgent to study attribute encryption access control method for high-dimensional medical data. By combining encryption technology with access control mechanism, it ensures that only authorized users can access sensitive medical data, so as to achieve data security and privacy protection [7]. At the same time, given the unique characteristics of high-dimensional medical data, it is imperative to optimize and enhance aspects such as data dimension, spatial complexity, and computational overhead. Consequently, conducting a thorough analysis of encryption access control methods specifically tailored for the attributes of high-dimensional medical data holds significant practical importance [8]. It can not only protect the privacy and data security of patients, but also promote the sharing and utilization of medical data, which is beneficial for the development of medical research and clinical practice. At the same time, the research also has certain challenges. Medical data is often high-dimensional data, including various attributes and features. In this case, how to effectively encrypt and access control high-dimensional data to ensure data security and not affect the availability of data is a challenge. In the access control of medical data, it is necessary to carry out fine-grained control on the data according to user roles and authority [9]. In the realm of encryption, achieving precise access control presents a notable challenge. The objective is to guarantee that only legitimate users are granted the appropriate data access permissions. Simultaneously, it is imperative to safeguard sensitive data from unauthorized access [10]. Consequently, it is essential to enhance both data access efficiency and computing performance, while maintaining robust data security, to fulfill the practical requirements of the medical system.

2. Related work

With the rapid development of information technology, data has become an important asset for both enterprises and individuals. Encrypted access control can ensure the security of data during transmission and storage, preventing unauthorized access or leakage of data. Therefore, many domestic and foreign scholars have conducted research on data encryption access control methods. Boomija et al. [11] proposed a medical data security access control method based on role-based partially homomorphic encryption user policies. This method indicated that access control policies in cloud environments were more flexible, and attackers could easily collect sensitive data by abusing the access policies of other users. However, the secure access data encryption model developed in cloud environments solves this problem. This model was implemented in Eclipse IDE and AWS Toolkit for Eclipse, and deployed in the Amazon Elastic Beanstalk (EB) environment. It was specifically designed to protect patients’ electronic health details. Although Amazon Elastic Beanstalk provides certain security features, the security of the model also depended on developers’ correct configuration and use of these features. Patil [12] designed a medical IoT security privacy protection and access control method based on password text policy attributes. This method achieved fine-grained control over EHR access, confidentiality, authenticity, and privacy protection by combining the advantages of attribute-based encryption and digital signatures. This method first executed access policies based on the unique characteristics of authorized electronic medical record users, and then supported security functions such as data confidentiality and access authentication through bi-linear pairing. Venema et al. [13] built a data access control method based on attribute encryption, which suggested that data could be stored by entities that were not necessarily trusted to perform access control, or by entities that were not even trusted to access plain-text data. On the contrary, access control could be enforced externally by trusted entities. In addition, some multi-permission variants of ABE (without central permission) can effectively and securely implement access control in multiple domain settings. In addition, ABE is the only encryption method for fine-grained access control, which does not require online trusted third parties during access requests, providing better availability properties. However, the multi-permission variant of ABE is difficult to provide flexible access control without central permission, which increases the complexity of management. Joshi [14] proposed an access control method based on hash algorithm. Hash algorithm was used to hide access strategy and combined signature verification scheme to resist internal attacks, achieving encrypted access to data attributes. However, generally speaking, the hash algorithm is one-way, which means that the original data cannot be recovered from the hash value. Therefore, in some applications, the unidirectionality of hash algorithms may become a problem. For example, hash algorithms cannot provide such functionality when decrypting or restoring encrypted data. In addition, hash collisions (where different inputs produce the same hash value) also pose certain risks. Mittal et al. [15] proposed a secure sharing method for medical data based on blockchain, IPFS, proxy re-encryption, and group communication. Proxy re-encryption and advanced encryption techniques provided strict access control. A blockchain-based group encryption scheme was proposed to ensure the security of group communication. The group session key was agreed upon by authorized group members and used to protect sensitive patient information. Finally, a blockchain data storage based on IPFS was proposed to achieve remote security maintenance of data. Although blockchain technology provides decentralized data storage, its scalability issues can limit the performance of the system. As the group size expands, blockchain may not be able to efficiently handle large amounts of transactions and data storage requirements. Merdassi et al. [16] proposed an LTMA-ABE mobile cloud location and time access security control scheme, which provided fine-grained access control policies based on ABE for encrypted data. When user attributes change, a multi-permission attribute access control system based on user anonymity is proposed to protect user identity from malicious permissions and support permission coexistence. This scheme adopts ABE’s location range constraint as a strategy to authorize users whose dynamic location and time meet these access policies. A multi-permission attribute access control system requires managing complex access control policies, especially when user attributes are dynamically changing. The definition, updating, and maintenance of strategies require a significant investment of computing resources and manpower.

In summary, in terms of data attribute encryption and access control, many scholars and experts have adopted methods such as ABE encryption, hash algorithm encryption, and access control based on blockchain and IPFS, all of which have certain security protection capabilities, but they all have shortcomings. The security of the role based homomorphic encryption user policy method depends on developer configuration and has limited flexibility. Improper configuration can introduce security vulnerabilities; The password text policy attribute method increases system complexity, especially when dealing with a large number of users and permissions, resulting in higher management and maintenance costs for the system; The multi permission variant in attribute encryption methods is difficult to provide flexible access control without central permission; Different inputs in hash algorithms can generate the same hash value, known as hash collision, which can pose certain security risks; The scalability issue of blockchain methods can limit the performance of the system. As the group size expands, blockchain cannot efficiently handle large amounts of transactions and data storage requirements; The dynamic location and time access strategy of LTMA-ABE mobile cloud location and time method can affect the performance of the system, especially in situations where real-time processing of a large number of access requests is required.

The study adopts Empirical Mode Decomposition (EMD) for processing and analyzing high-dimensional data, improving data processability and security. The wavelet thresholding algorithm is introduced for data denoising to improve the quality and readability of encrypted data. Moreover, the study employs fuzzy encryption algorithm to enhance the robustness of the encryption process, ensuring the readability of data even in the event of partial data corruption. Furthermore, a trust level access control attribute tree and an access request graph are constructed, designed to provide fine-grained control over data access. These tools facilitate the management of complex access control policies through a combination of visualization and logical reasoning, thereby simplifying the complexities involved in security management. By seamlessly integrating these technologies, an intelligent encryption access control method tailored specifically for high-dimensional medical data attributes is established, ensuring robust security for such data access.

3. Research contribution

Medical data usually contains sensitive personal information such as medical history, diagnosis results, treatment plan, etc. Through attribute encryption technology, fine-grained access control of these data can be achieved, ensuring that only authorized users can access relevant information, so as to protect the privacy of patients. Attribute encryption offers robust support for intricate access control policies. It dynamically adjusts access permissions based on various user attributes, including roles, departments, and permission levels. This ability enables medical institutions to flexibly manage data access based on their specific needs and circumstances. A high-dimensional medical data attribute encryption access control based on fuzzy algorithm is proposed to address the security of existing data encryption access control methods. The main contributions of the proposed method are as follows:

  1. (1) The study incorporates denoising as a mechanism for improving data accuracy, protecting patient privacy, and improving data quality. Through denoising, noise interference during data transmission and storage can be eliminated, ensuring the authenticity and integrity of the data.
  2. (2) Fuzzy encryption algorithm, a novel security technology, is applied to medical data protection. By introducing randomness and fuzziness, the complexity and security of data encryption are significantly improved. In addition, the flexible key configuration strategy proposed in the study can be finely adjusted according to different security levels and user permissions of medical data, ensuring the efficiency and accuracy of data access control. The refined design of the encryption and decryption process further enhances the transparency and security of the data processing, providing an innovative solution for the security management of medical data.
  3. (3) By utilizing dynamic grouping and fuzzy mathematics theory, a comprehensive set of trust calculation methods is designed. These methods aim to optimize medical data access control, ensuring the confidentiality and integrity of the data. Additionally, evaluate the trust relationships between entities and streamline the organizational structure and management mode. Consequently, the methods effectively manage access rights to medical data and significantly reduce the risk of data leakage.
  4. (4) A comprehensive set of advanced technologies is adopted, especially the recursively constructed access request graph, which facilitates dynamic and hierarchical access control. This is complemented by a fine-grained access control strategy aimed at enhancing both security and accuracy. Furthermore, fuzzy encryption algorithm integration enables users to perform keyword fuzzy search while ensuring data security. Additionally, to protect the privacy of the index, an algorithm verification mechanism is implemented to safeguard the privacy and security of the index, thereby preventing keyword information leakage and further strengthening system security and user data privacy protection. The synergistic effect of these innovative technologies ultimately forms an efficient, secure, and user-centric medical data encryption access control framework.

4. Proposed method

The detailed technical route of the proposed method is as follows:

  1. Step 1: The first difference of phase data is calculated to evaluate the stability of medical data attributes, and the relative phase change is calculated by combining the relative instantaneous frequency, initial frequency, and linear frequency. EMD algorithm is used to decompose the original medical data into multiple Intrinsic Mode Function (IMF) components and a remainder to remove noise and extract valuable data attributes. The wavelet threshold algorithm is used to reconstruct the high-frequency IMF component twice to achieve more refined denoising effects.
  2. Step 2: On the basis of denoising medical data attributes, this article deeply studies the process of encryption and decryption using fuzzy encryption algorithm. In the encryption stage, the key block size s is set to 24-25. First, data fields are encrypted, followed by record encryption, in which both the system and users can participate to ensure the secure transmission and storage of sensitive information. During the decryption stage, which involves decrypting both records and fields, the process is collaboratively carried out by both the database and the system, ensuring robust data security and identity verification. Furthermore, the modular implementation of encryption algorithms is not constrained by parentheses, thereby enhancing execution efficiency.
  3. Step 3: The trust level access control attribute tree is constructed. Data confidentiality, data integrity, and reputation are considered key characteristics of entity trust to evaluate the trust level of access control objectives. The feedback trust of the recommended nodes is weighted to obtain the recommended trust of the evaluated nodes. The trust relationship, interaction behavior, and data access control objectives between entities are considered to ensure the confidentiality and integrity of access objects.
  4. Step 4: The access request graph is constructed to effectively manage and control users’ encrypted access rights. The graph uses recursive method to combine and layer the associated access request nodes. The subordinate categories that have access to the data are further analyzed, and stringent restrictions are enforced solely on users who possess the corresponding attribute sets and are assigned to the relevant classification category sets, thereby granting them permission to download and decrypt the data. The subordinate categories that have access to the data are further scrutinized, and stringent restrictions are enforced exclusively on users who possess matching attribute sets and classification category sets, allowing them to download and decrypt the data.

The fuzzy encryption algorithm is introduced, which involves the generation of security parameters, user and server keys by the key management center, as well as encrypting files and indexes. After receiving the encrypted data, the server decrypts it with a specific key. When the user searches through keywords, the algorithm will generate a trap door to protect the data privacy.

5. Medical data attribute denoising processing

During the transmission and storage of medical data, noise can have adverse effects, leading to phase and frequency deviations in the output data. To enhance the reliability of access control for high-dimensional medical data attributes, it is imperative to undertake denoising processing of medical data attributes. Firstly, denoising can improve data accuracy and integrity, eliminate the impact of noise interference on data attributes, and reduce phases and frequency deviations. This helps to ensure the authenticity of data and improve reliability in data transmission and storage. Secondly, denoising processing helps to protect patient privacy, reduce the risk of sensitive information leakage, and improve the security of encrypted access control systems. Finally, denoising medical data attributes can improve data quality, enhance data interpretability and credibility, ensure that security measures implemented in encrypted access control systems are based on high-quality data, and enhance system reliability and stability. Therefore, medical data attribute denoising is crucial for improving the reliability of access control for high-dimensional medical data attribute encryption, ensuring data accuracy, privacy, and quality, and effectively protecting the integrity and confidentiality of medical data.

Phase data and frequency data are primarily utilized to characterize the stability of the collected medical data attributes. These stability indicators can be derived by calculating the first difference of the phase data and then dividing this difference by the sampling time. The relative change in phase and the relative instantaneous frequency deviation of medical data attributes are all generated by the determined change in data and random occurrence.

The relative phase change, which is computed under the constraints of random variations, is determined by combining the relative instantaneous frequency, the initial frequency, and the linear frequency component. The specific calculation equation for this relative phase change is presented in equation (1):

(1)

In equation (1), represents the relative instantaneous frequency deviation. r represents the frequency data in the initial stage. β represents the linear frequency. represents the random variation.

The relative phase change is obtained according to equation (1), which is constrained by valuable medical data attributes. The original high-dimensional medical data attribute set considering noise data interference is constructed. The specific calculation equation is shown in equation (2):

(2)

In equation (2), represents valuable medical data attributes. stands for noise data.

EMD is a cyclic iterative algorithm, which is conducive to removing noise in medical data through data decomposition. To extract valuable medical data attributes, the EMD algorithm is utilized. This algorithm decomposes the original medical data into multiple IMF components, along with a residual component. Each IMF component represents a specific frequency, and they are arranged in descending order, starting from the largest to the smallest frequency. Importantly, all IMF components must concurrently satisfy the specified conditions:

  1. (1) It must be ensured that the maximum number of points and the number of zeros in each numerical sequence are equal or the maximum difference between the two is 1.
  2. (2) The average envelope of the maximum and the minimum extreme points at a random point is 0.

After EMD decomposition processing, the useful data is relatively stable, while the noisy data is more volatile. Therefore, the high-frequency IMF component of the data is obtained by spectral analysis. The wavelet threshold algorithm is employed to initially reconstruct the acquired high-frequency IMF component twice. Following this reconstruction process, noise reduction is performed, and subsequently, the attributes of the medical data are extracted. The detailed operational steps are outlined below:

  1. Step 1: The number of windows is set as m. The swarm intelligence algorithm is used to extract data attributes [17,18]. The amount of data in each window is J, and the remaining data is composed into a separate window, with a total of n windows.
  2. Step 2: The high-frequency component is separated from the initial medical data attribute . Then, the first residual component is obtained, as shown in equation (3):
(3)

In the above equation (3), z represents the high-dimensional constraint parameter of medical data attributes.

  1. Step 3: After spectrum analysis and processing of all IMF components are conducted, filtered IMF components that still contain noise are obtained.
  2. Step 4: Soft threshold function and wavelet threshold are used to denoise IMF components containing noise. The corresponding soft threshold coefficient λ is shown in equation (4):
(4)

In the above equation (4), μ represents the coefficient of determination, and represents the wavelet transform coefficient.

  1. Step 5: According to the soft threshold coefficient λ and the remaining component of the i -th window, the medical data attribute after denoising processing is obtained, as shown in equation (5):
(5)

The above operation calculates the relative phase change by combining relative instantaneous frequency, initial frequency, and linear frequency. The EMD algorithm is used to decompose medical data attributes and filter IMF components containing noise through spectral analysis. Next, the wavelet thresholding algorithm is applied for secondary reconstruction of high-frequency IMF components. Subsequently, a soft thresholding function is employed to perform denoising processing. The soft threshold coefficient is adjusted in order to precisely control the degree of denoising. As a result, the final denoised medical data attributes are obtained, leading to an improvement in the quality of the data attributes and an enhancement of the reliability of access control for high-dimensional medical data.

6. Attribute encryption of high-dimensional medical data

Fuzzy Algorithm is a mathematical algorithm based on fuzzy logic, which is used to deal with uncertainty and fuzziness [1921]. Different from the traditional binary algorithm, fuzzy algorithm can deal with fuzzy input and output, making the calculation result more in line with the actual situation. Traditional encryption algorithms typically rely on deterministic keys for both encrypting and decrypting data. In contrast, fuzzy encryption incorporates elements of randomness and fuzziness, rendering the ciphertext more resistant to cracking. Specifically, a fuzzy algorithm can either generate a fuzzy key or implement a fuzzy encryption approach to bolster data security and enhance resistance against attacks.

6.1 Key configuration

The key configuration of medical data fields with different security levels within the same field is shown in Fig 1.

thumbnail
Fig 1. Schematic diagram of medical data security key configuration.

https://doi.org/10.1371/journal.pone.0317119.g001

In Fig 1, the key for the medical data field is , and . represents the sub-key for different fields.

The schematic diagram of medical data security key configuration shows a hierarchical increasing process, introducing new and elements in each stage while retaining all previous stage elements to build a gradually enhanced security mechanism. This configuration ensures high integrity and security of medical data during transmission and storage by continuously accumulating and combining security elements ( and ) at each stage.

For the convenience of describing the encryption process, the intermediate medical data key configuration should be defined to complete encryption calculations or data storage in advance [22,23]. The user security level and field security level are independent of each other. The steps for configuring medical data keys are as follows.

  1. Step 1: User configuration key. The user’s master key is used to decrypt the block key and security level fields, if the user security equivalence is v, the key to master decryption is , where represents the security level of the i -th data.
  2. Step 2: System configuration key. The system needs to master the block key and the decryption key of all security level fields.

6.2 Encryption process

In the encryption process, the threshold for the size of the key block is set to . The size of the medical data key block should be less than [24,25]. Modular operations are not limited by parentheses. According to the key configuration of medical data security fields, data encryption is implemented. The specific encryption steps are as follows:

  1. Step 1: Field encryption. This step can be implemented not only by users with the same security level as this field, but also by the system. If completed by the user, the ciphertext should be sent to the system after the user performs the encryption operation [2628]. The specific calculation equation is shown in equation (6):
(6)

In the above equation (6), represents the encryption coefficient. K represents the security factor.

  1. Step 2: Record encryption. Record encryption is a step that is typically implemented through the use of a system. Specifically, if the security level of each medical data field is equivalent, this step can associate the medical data field with the corresponding security level. The specific calculation method for this association is illustrated in equation (7):
(7)

By introducing a threshold for key block size, the encryption process can optimize key partitioning based on actual situations, enhancing performance and security. The rule that modular operations are not limited by parentheses may improve the execution efficiency and adaptability of the algorithm. In addition, the encryption process is customized based on the key configuration of medical data security fields to ensure effective encryption of fields with different security levels.

6.3 Decryption process

To assess the security and protection mechanisms of encrypted access control for high-dimensional medical data attributes, it is essential to ensure that the overall data access control system reliably enforces data protection and authentication. Encrypting and decrypting data is a crucial step in preventing unauthorized third-party access to sensitive information that has been collected and stored. The specific decryption steps are as follows.

  1. Step 1: Record decryption. This step is typically handled by the database system itself. However, if the security level of each field within the record is equivalent, users with a corresponding security level may also perform this step. The precise calculation involved in this process is outlined in equation (8):
(8)

In the above equation (8), D represents the security level reference value, and represents the decryption coefficient.

  1. Step 2: Field decryption. This step is usually implemented by the system. If each field has the same security level, this step can also be implemented by users with the same security level as the field.

Firstly, the is extracted from ϖ to obtain and . Then, the remainder theorem is used to calculate .

The decryption process not only focuses on data recovery, but also emphasizes evaluating and strengthening the security and protection capabilities of the entire encrypted access control system. By implementing a division of labor and cooperation between the database and the system, the decryption process has achieved enhanced efficiency and security. The security level reference value and decryption coefficient together offer flexible and tailored decryption strategies for data that possess varying security levels.

The schematic diagram of the encrypted data flow of high-dimensional medical data attributes is shown in Fig 2.

thumbnail
Fig 2. Schematic diagram of encrypted data flow of high-dimensional medical data attributes.

https://doi.org/10.1371/journal.pone.0317119.g002

In Fig 2, the original password is sent from the generating end to the receiving end through a transmission channel, and a key is generated by a password generator at both the generating and receiving ends. Plaintext flow encrypts/decrypts with keys, while Cryptanalyzer is used to analyze and crack encrypted information.

The pseudo-code of the attribute encryption algorithm for high-dimensional medical data is shown in Fig 3.

thumbnail
Fig 3. Pseudo-code for encrypting high-dimensional medical data attributes.

https://doi.org/10.1371/journal.pone.0317119.g003

7. Medical data attribute encryption access control

After completing the encryption of medical data attributes, in order to further improve the security of the data, it is necessary to further control access permissions.

7.1 Trust calculation of access behavior based on dynamic grouping

The logicality between the trust level calculation equations is based on the trust calculation of data access behavior. Firstly, the key characteristics of entity trust are defined, encompassing data confidentiality, data integrity, and reputation. These access control objectives are used as the foundation for trust evaluation. Based on this foundation, the trust access control attribute tree is carefully constructed. Then, the fuzzy mathematics theory is used to establish the trust evaluation level and its mathematical description, and the trust vector calculation equation is designed. The member nodes within the group are classified into different roles based on their common interests. Additionally, an organizational structure tailored for similar interest aggregation, along with a dynamic management mode, is implemented.

Medical users are considered as unified entities, with access control measures enforced based on their entity trust levels. Additionally, the credibility assessment of these entities’ behavior is specifically aimed at ensuring the confidentiality and integrity of the objects they access. Access control objectives are defined, trust factors of access control for high-dimensional medical data are analyzed layer by layer. The extensible attributes of trust are represented as a tree graph, as shown in Fig 4. The key characteristics of entity trust include data confidentiality, protection data completeness, and credibility [29,30]. Reputation is the judgment of other entities on the trust level of the entity being evaluated, which should be taken as an important element in the trust evaluation process.

The quantitative expression of trust is to build a mathematical model about trust. The model should be constructed according to the unique characteristics of trust, and the reliable mathematical tools should be used to complete the model structure. The inherent subjectivity and fuzziness of trust are pivotal factors influencing the degree of trust and pose a central challenge in accurately describing trust. In this paper, fuzzy mathematics theory is employed to derive an evaluation level and provide a mathematical description of trust, aiming to enhance the overall understanding and representation of trust. is set to be a collection of connected entities within the medical data. is set to be a separate entity. W is the trust evaluation set. is the evaluation level vector set. The trust vector calculation equation is shown in equation (9):

(9)

The grouping concept is integrated into the establishment and assessment of trust models. Consequently, nodes sharing similar interests and hobbies are grouped together. Furthermore, the member nodes within each group are managed in a distributed fashion. By enhancing the frequency of repeated transactions among group nodes, the communication traffic generated by searching for trust data is effectively contained within a localized scope. In turn, the reduction in medical data communication costs leads to enhanced scalability performance of the system. An organizational structure and dynamic management model, centered around the aggregation of similar interests, have been designed. This design categorizes group nodes into three distinct roles: group member nodes, group head nodes, and group manager nodes. The entity node d weights the feedback trust of each recommendation node to obtain recommendation data, and obtains the recommendation trust of the evaluated medical data node f. According to the calculation results of the trust vector, the recommended trust equation is described in equation (10):

(10)

In the above equation (10), represents the service trust level of the recommended node towards node f. represents the feedback trust level of node d. I and J represent the recommended node dataset for nodes f and d.

Under the constraint of recommendation trust, the service trust between member nodes in the same group is calculated, as shown in equation (11):

(11)

In equation (11), χ represents the frequency parameter, and g is the preset threshold for the number of interactions.

The above equation considers the trust relationship between entities, interaction behavior, and data access control objectives, and ensures the confidentiality and integrity of the accessed object. The credibility factor is incorporated into the equation as a crucial component for assessing the trust level of entities. By utilizing weighted calculation methods and setting appropriate frequency parameters, the trust degree is evaluated quantitatively, thereby enhancing the capability to manage and control the trust level during the process of medical data access.

The scenarios that trust calculation can meet include medical data access control, protection of data confidentiality and integrity, establishment and evaluation of trust relationship between entities, optimization of organizational structure and management mode, etc. By calculating and evaluating trust, access rights to medical data can be efficiently managed, thereby mitigating the risk of data leakage.

7.2 Access control process

After medical users successfully log in, their access permissions can be analyzed. In order to effectively control the encrypted access permission of the medical user, the access request graph is established. Each concurrent access request in the access graph is regarded as a node. The process of access graph construction is a recursive method, which constructs the associated nodes into an access graph. The process of establishing access requests is as follows:

  1. Step 1: An access graph node is created for parallel medical network access requests.
  2. Step 2: Nodes that triggered access control are categorized into Group (A), while those that do not trigger access control are categorized into Group (B).
  3. Step 3: Group A stratifies nodes according to the control security level of the access resources of the requested node. After stratification, the associated node is created as a new node, which is recorded as an aggregation node.
  4. Step 4: Due to the correlation between levels, the upper and lower nodes are combined together by collecting nodes, and then the newly created collection nodes are connected.

The above steps are repeated to generate a medical network access request, as shown in Fig 5.

Based on the established access request graph, the subordinate categories of the accessed data are analyzed. By examining the dependency classification of accessed data, it can be noted that broad classifications typically include multiple subclasses. Furthermore, due to the interdependence between the accessed data classes, these subclasses can be further divided. Users can only download and decrypt data when they have a universal set of attributes and classification categories that comply with fine-grained medical network access control policies. The classification attributes of the data are determined based on the medical user’s classification category, while the data security level is set according to the user’s security clearance. If the data does not meet the specified requirements, the process will proceed to the next step. Additionally, to further safeguard the security of the data, a fuzzy encryption algorithm is employed to encrypt the data at each layer. Below are the specific encryption processing steps.

  1. Step 1: The key management center takes the security parameter as input and outputs a cyclic group G, a generator w of the cyclic group, a prime number ρ, and a hash function H. A random trust number φ is randomly selected from and is calculated. is output as the public key and as the root key.
  2. Step 2: The key management center executes the algorithm to generate user key and server key . The user establishes an index for the high-dimensional medical data attribute keyword α, where M represents a fuzzy set containing keyword α and represents a file number containing keyword α.
  3. Step 3: The fuzzy encryption algorithm needs to encrypt two types of data, namely file and index . The ElGamal proxy encryption algorithm is used to encrypt the file as . Another key can be generated based on the user’s private key to encrypt the index. The key is generated through hash function H. . ς is implemented through RSA algorithm, and is implemented through AES algorithm. Finally, the encrypted file and index are uploaded to the server.
  4. Step 4: After receiving the encrypted file and index, the server first finds the server key corresponding to the i -th user . The final encrypted ciphertext is obtained.
  5. Step 5: If user searches for relevant encrypted files through keywords, the fuzzy encryption algorithm will generate a trap. The fuzzy set of keywords is . A trapdoor is generated through the key , and the user sends to the server.
  6. Step 6: After receiving the trapdoor sent by the user, the server will compare with the index and return all encrypted files that meet the conditions. The server decrypts to obtain , which is also the relevant encrypted file .
  7. Step 7: The server first finds the server key corresponding to user stored on it, and uses to partially decrypt . Therefore, the ciphertext becomes , and the server sends to user .
  8. Step 8: After receiving the cipher-text sent by the server, user uses the key in their hands to calculate and get the final civilization file.

In the fuzzy encryption scheme presented in this article, the index calculation remains consistent for requests pertaining to the same keyword, thus necessitating the proof of only the privacy and security of the index. Assuming that the search scheme cannot guarantee the privacy and security of the index in the case of keyword attacks, there exists an algorithm ϑ that can extract some potential information of keywords from the index. This article establishes to use algorithm ϑ to determine whether certain functions are pseudo-random functions. The algorithm has permission and can take a secret value κ as input. Then, is returned. After receiving a request for index calculation, sends the request to . After completing the trapdoor query, the attacker will output two keywords and with the same length and distance. randomly selects a , and sends to the challenger. Then, obtains a value Y generated by a pseudo-random function or a random function. sends the value Y to ϑ, and ϑ responds to with . If ϑ can correctly guess the value of with an undeniable probability, it indicates that the value Y is not randomly generated. Therefore, can determine whether is a pseudo-random function. Due to the indistinguishability between pseudo-random functions and real random functions, the maximum probability of ϑ correctly guessing the value of is 1/2. Therefore, the privacy search is secure.

Based on the aforementioned steps, the medical network access can swiftly pinpoint black hole information as well as detect potential malicious intrusion risk details. The medical user access situation is planned based on the above process. Concurrent users are managed efficiently, and the risk of medical data leakage due to simultaneous malicious access is mitigated. This holistic approach guarantees the successful implementation of encryption access control for high-dimensional medical data attributes.

The access control block diagram based on fuzzy algorithm is shown in Fig 6.

thumbnail
Fig 6. Access control block diagram based on fuzzy algorithm.

https://doi.org/10.1371/journal.pone.0317119.g006

In Fig 6, multiple medical entities interact with each other in a complex and orderly manner. The datasets handled by these medical entities undergo meticulous classification into “amount,” “type,” and “specific data content.” Each category is entrusted to a rigorously authorized central management agency to maintain compliance and security in data transmission and processing. In the data storage and access system, the data storage system acts as a pivotal element. It retrieves and prepares data resources from highly secure storage devices. This process facilitates the system’s ability to efficiently meet a wide range of client demands. Within the data storage and access system, clients submit service requests via specifically designed access points. After receiving these requests, the system quickly and accurately provides tailored data service responses for the requested content. This arrangement establishes a seamless closed-loop data request-response process. It not only facilitates efficient data flow, but also strengthens security measures around data access.

The pseudo-code for access control is shown in Fig 7.

8. Experimental verification

In this experiment, the data attribute encryption access control process is divided into the following steps.

  1. Step 1: The access control method is run to obtain private and public keys;
  2. Step 2: The method is connected to data attributes, statistical data is summarized, and the attributes and attribute weights of the data stored in the data attributes are calculated;
  3. Step 3: The attribute weights are determined, an access control model is generated, and the data that needs to be encrypted is encrypted to obtain cipher-text;
  4. Step 4: The data attribute set is determined and a marked user private key is generated;
  5. Step 5: The cipher-text is decrypted to obtain access to data attributes.

The computer configuration used in the experiment is Intel Core i7-5775C, CPU. It has 8 cores at 2.1GHz, 16GB of memory, and a 2T hard drive. In terms of testing indicators, access time and encryption/decryption duration are selected to test the computational efficiency of the proposed method. The stability of the proposed method is verified using packet loss rate, and the security performance is tested using attack success rate. The settings of each parameter in the experiment are shown in Table 1

8.1 Access time test results

In real-world applications, high-dimensional medical data often encompasses a vast number of attributes and records, resulting in a significant volume and complexity of data. If the performance of the encrypted access control method is slow or inefficient, users may encounter delays or experience prolonged response times when accessing and manipulating this data. This has a direct impact on user experience and productivity. The medical field has high requirements for real-time and timely response of data. For example, in a clinical decision support system, doctors need to quickly access and analyze data to make accurate diagnosis and treatment recommendations. If the time consuming performance of encrypted access control methods is too high, it may not be able to meet the needs of real-time data processing and response. The number of medical data is set to gradually increase from 10,000 pieces to 1 million pieces. The calculation time of the proposed method is recorded, as shown in Fig 8.

As can be seen from Fig 8, when the proposed method stored a small amount of data in the data attributes, the operation time required for each stage remained basically unchanged. However, when the amount of data stored in the data attributes increased, the data for statistical induction of data attributes and their weight values increased sharply, resulting in a significant increase in the computation time of step 2. When the number of data attributes reached 240,000, the encrypted access control time was still less than 60ms. The results show that the proposed method has a fast operation efficiency when controlling data attribute access.

8.2 Data attribute encryption - time comparison test of different decryption methods

The access control method based on password text policy attributes [12] and the access control method based on attribute encryption [13] are used as comparison methods. The encryption, decryption, and total control time of its data are compared with the proposed method. The results are shown in Fig 9.

thumbnail
Fig 9. Comparison of encryption and decryption time using different methods.

https://doi.org/10.1371/journal.pone.0317119.g009

From Fig 9, as the number of data attributes increased, the encryption and decryption time of the three sets of access control methods also increased. The encryption and decryption time of the proposed method notably surpasses those of access control methods based on password text policies and attribute encryption. Consequently, this method is unlikely to bring additional operational pressure to the system when managing data attribute access.

8.3 Comparison of packet loss rate under different methods

During the transmission of high-dimensional medical data, packets may be lost or corrupted due to network or communication equipment failures. If the encrypted data is lost or damaged, it cannot be decrypted correctly and the data cannot be recovered. The high-dimensional medical data often has a large volume and complex structure, and it needs a large amount of computing resources to encrypt it with strong encryption algorithm. During the process of data transmission, the encryption operation may experience excessive delays due to limitations in communication bandwidth or processing capabilities. Consequently, the data may not be transmitted in a timely and efficient manner, ultimately resulting in potential data loss.

For this reason, in this experiment, the data packet loss rate is taken as an indicator of the comparison method. The packet loss rate refers to the proportion of packets lost during data transmission, usually expressed as a percentage. The comparison results are shown in Fig 10.

As shown in Fig 10, the high-dimensional medical data attribute encryption access control method in this study showed a significant reduction in packet loss rate after control, almost eliminating the situation of packet loss. In contrast, access control methods that rely on password text policy attributes and attribute encryption exhibit a higher frequency of packet loss during the control process, indicating that the control method explored in this study shows excellent performance in terms of application effectiveness.

8.4 Different methods of attack success rate test

The main attack faced in high-dimensional medical data attribute encryption access control is “privacy breach attack”. This is because high-dimensional medical data may contain sensitive privacy information of patients, such as case records, diagnostic results, treatment plans, etc. If data that lacks effective encryption and access control measures is leaked, the privacy of patients will be compromised. Attackers may endeavor to deduce the identity and sensitive information of individual patients by exploiting correlations between multiple anonymized datasets. There are a large number of attributes in high-dimensional data, which can make it easier to identify and correlate. Therefore, in this test, the type of attack designed is privacy breach attack.

By testing the success rate of resisting attacks, the security of the system can be verified and effectively defended against attacks, protecting data from leakage or damage. The success rate of resisting attacks is shown in equation (12):

(12)

In equation (12), represents the number of successful attempts to resist attacks, and represents the total number of attacks.

During the process of encrypting access to medical data attributes, a human privacy breach attack is carried out on all medical data. The success rates of resisting attacks using different methods are tested. The experimental results are shown in Fig 11.

thumbnail
Fig 11. Comparison of success rates of different methods in resisting attacks.

https://doi.org/10.1371/journal.pone.0317119.g011

From Fig 11, the success rate of using the encryption method to resist attacks was significantly higher than the other two methods, with a maximum of 100%. The highest success rates of access control methods based on password text policy attributes and attribute encryption to resist attacks were 91.5% and 87.5%, respectively. It can be seen that the proposed method has better security and can effectively prevent the leakage of medical data attributes.

9. Discussion

Based on the above research results, firstly, although the computation time increases when the data volume is large, the entire encryption access control time is still less than 60ms when the number of data attributes reaches 240000. This result indicates that even in the face of relatively large medical datasets, the proposed method can still maintain fast computational efficiency, meeting the high requirements of the medical field for real-time data processing and timely response. Secondly, as the number of data attributes increases, the encryption and decryption time of the three access control methods all increase, but the proposed method has significantly lower encryption and decryption and total control time than comparison methods. In the encryption stage, the longest time consumption of the proposed method is only 20ms, which is 21ms less than the access control method based on password text policy attributes, indicating that the proposed method has a lower operational burden in controlling data attribute access. After that, in high-dimensional medical data transmission, the data attribute encryption access control method proposed in this study significantly reduces the data packet loss rate, with almost no packet loss phenomenon. In the following section, the medical data attribute encryption access control method introduced in this article demonstrates a significantly higher success rate in preventing human privacy leakage attacks, when compared to traditional methods that rely on password text policy attributes and attribute encryption. The proposed method has a maximum success rate of 100% in resisting attacks, which is 8.5% and 12.5% higher than other methods, effectively enhancing the security of medical data. Finally, the experiment shows that the method is still effective when the number of data attributes reaches millions.

10. Conclusion

It is very important to ensure that only authorized users can access high-dimensional medical data. Therefore, it is necessary to design appropriate user authentication and access authorization mechanisms to ensure that legitimate users can access and manipulate data. Therefore, this study proposed a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm. The EMD algorithm effectively removed noise from medical data, improving the quality and reliability of the data. In order to strengthen data protection, a fuzzy encryption algorithm was designed for key configuration, effectively preventing unauthorized access and data leakage. Finally, by calculating the credibility of access behavior based on dynamic grouping, data access permissions could be more accurately controlled. The test results showed that the proposed method effectively resisted privacy leakage attacks. The proposed method had a success rate of up to 100% in resisting attacks. Although the high-dimensional medical data attribute encryption access control method based on fuzzy algorithm proposed in this study shows good performance in experiments, there are still some limitations, such as the complexity of user authentication and access authorization mechanisms, which can increase the difficulty of implementation. In future research endeavors, the focus will be on simplifying user authentication and access authorization mechanisms, while ensuring strong data security to enhance their deployability and maintainability.

References

  1. 1. Sammeta N, Parthiban L. Data ownership and secure medical data transmission using optimal multiple key-based homomorphic encryption with hyperledger blockchain. Int J Image Graph. 2023;23(3):224–9.
  2. 2. Panda S, Mondal S, Dewri R. Towards achieving efficient access control of medical data with both forward and backward secrecy. Comput Commun. 2022;189(5):36–52.
  3. 3. Chen Z, Xu W, Wang B. A blockchain-based preserving and sharing system for medical data privacy. Future Gener Comput Syst. 2021;124(16):338–50.
  4. 4. Koe ASV, Chen Q, Tang J. Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud. Int J Intell Syst 2022;37(11):9774–97.
  5. 5. Liu J, Fan Y, Sun R. Blockchain-aided privacy-preserving medical data sharing scheme for E-healthcare system. IEEE Internet Things J. 2023;10(24):21377–88.
  6. 6. Rahmouni H, Munir K, Essefi I, et al. An ontology-based compliance audit framework for medical data sharing across Europe. Int Arab J Inf Technol. 2021;18(2):158–69.
  7. 7. Lakshmanan M, Anandha Mala GS. Merkle tree-blockchain-assisted privacy preservation of electronic medical records on offering medical data protection through hybrid heuristic algorithm. Knowl Inf Syst. 2023;66(1):481–509.
  8. 8. Ecarot T, Fraikin B, Lavoie L. A sensitive data access model in support of learning health systems. Computers. 2021;10(3):25–44.
  9. 9. Rong X, Yang ZE. A medical big data access control model based on fuzzy trust prediction and regression analysis. Appl Soft Comput. 2022;117(20):108–15.
  10. 10. Liu N, Ma W, Shen D. Research on decentralized access control in big data environment. J Phys: Conf Ser. 2021;19(1):120–5.
  11. 11. Boomija MD, Raja SVK. Securing medical data by role-based user policy with partially homomorphic encryption in AWS cloud. Soft Comput. 2023;27(1):559–68.
  12. 12. Patil RY. A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption. Int J Inf Technol. 2024;16(1):181–91.
  13. 13. Venema M, Alpar G, Hoepman JH. Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice. Des Codes Cryptogr. 2023;91(1):165–220.
  14. 14. Joshi GP. Ciphertext-policy attribute-based encryption for cloud storage: toward data privacy and authentication in AI-Enabled IoT system. Mathematics. 2021;10(1):68–75.
  15. 15. Mittal S, Ghosh MA. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication. J Supercomput. 2024;80(6):7955–92.
  16. 16. Merdassi I, Ghazel C, Saidane LA. A new LTMA-ABE location and time access security control scheme for mobile cloud. J Supercomput. 2023;79(11):12074–105.
  17. 17. Hu S, Yin H. Research on the optimum synchronous network search data extraction based on swarm intelligence algorithm. Future Gener Comput Syst. 2021;125:151–5.
  18. 18. Li Q, Li S. Optimization of artificial CNN based on swarm intelligence algorithm. IFS. 2021;40(4):6163–73.
  19. 19. Kanimozhi P, Victoire TAA. Oppositional tunicate fuzzy C-means algorithm and logistic regression for intrusion detection on cloud. Concurr Comput: Pract Exp. 2022;34(4):662–7.
  20. 20. Chia-En Lai and C-YH. Developing a modified fuzzy-GE algorithm for enhanced test suite reduction effectiveness. Int J Performability Eng. 2023;19(4):223.
  21. 21. Li H, Yang J. Design of distributed WSNs fire remote monitoring system based on fuzzy algorithm. IFS. 2021;41(3):4319–26.
  22. 22. Ampavathi A, Pradeepini G, Saradhi TV. Optimized deep learning-enabled hybrid logistic piece-wise chaotic map for secured medical data storage system. Int J Inf Technol Decis Mak. 2023;22(05):1743–75.
  23. 23. Xiao L, Zou B, Zhu C, et al. ESDedup: An efficient and secure deduplication scheme based on data similarity and blockchain for cloud-assisted medical storage systems. J Supercomput. 2023;79(3):2932–60.
  24. 24. Liu Q, Ma X. Security model and design of network communication system based on data encryption algorithm. Int J Auton Adapt Commun Syst. 2021;14(2):89–97.
  25. 25. Budati AK, Snv G, Cherukupalli K, et al. High speed data encryption technique with optimized memory based RSA algorithm for communications. Cir World. 2021;47(3):269–73.
  26. 26. Philips A, Jayaraj J, F.T. J, P. V. Enhanced RSA key encryption application for metering data in smart grid. IJPCC. 2021;17(5):596–610.
  27. 27. Kodada BB, D’Mello DA. FSACE: finite state automata-based client-side encryption for secure data deduplication in cloud computing. Int J Cloud Comput. 2023;12(6):531–55.
  28. 28. Chandnani N, Verma K. A comparison on type-II fuzzy logic based data encryption techniques in the Internet of Things. IFS. 2023;44(2):2109–16.
  29. 29. Nagarani C, Kousalya R. Trust level evaluation based asymmetric cryptography protocol for flexible access control in fog computing. IJCNC. 2021;13(3):109–21.
  30. 30. Zhao L, Sun M, Yang B, Xie J, Feng J. Zero trust access authorization and control of network boundary based on cloud sea big data fuzzy clustering. IFS. 2022;43(3):3189–201.