GP-STCKS: A GeoPrefix-based Spatio-Temporal Controllable Keyword Search Scheme for Privacy-Preserving Electronic Health Systems
DOI:
https://doi.org/10.63313/JCSFT.9048Keywords:
Attribute-Based Keyword Search, Spatio-Temporal Access Control, Location Privacy, Geohash Indexing, E-health SystemsAbstract
The proliferation of cloud-based e-health systems necessitates outsourcing sensitive Electronic Health Records (EHRs), raising critical privacy and access control concerns. While Attribute-Based Keyword Search (ABKS) enables secure encrypted retrieval, existing schemes inherently lack fine-grained spatio-temporal constraints. To address this, we propose GP-STCKS, a novel privacy-preserving spatio-temporal controllable keyword search scheme. By seamlessly integrating Geohash hierarchical indexing into the Ciphertext-Policy ABKS (CP-ABKS) framework, our scheme enforces strict dual access constraints over specific time intervals and spatial hierarchies. Rigorous formal analysis proves its resilience against chosen-keyword and multi-dimensional key collusion attacks while guaranteeing keyword confidentiality. Extensive experiments demonstrate that GP-STCKS maintains lightweight overhead and optimal search efficiency, perfectly balancing stringent privacy protection with real-world e-health deployability.
References
[1] Q. Zheng, S. Xu, and G. Ateniese, “VABKS: Verifiable attribute-based keyword search over outsourced encrypted data,” in Proc. IEEE Conf. Comput. Commun., 2014, pp. 522–530.
[2] W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, “Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud,” in Proc. IEEE Conf. Comput. Commun., 2014, pp. 226–234.
[3] Y. Miao et al., "Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud," in IEEE Transactions on Mobile Computing, vol. 23, no. 5, pp. 3650-3665, May 2024, doi: 10.1109/TMC.2023.3277702.
[4] Zhu Y, Hu H, Ahn G J, et al. Comparison-based encryption for fine-grained access control in clouds[C]//Proceedings of the second ACM conference on Data and Application Security and Privacy. 2012: 105-116.
[5] Z. Wang, D. Huang, Y. Zhu, B. Li, and C.-J. Chung, “Efficient attributebased comparable data access control,” IEEE Trans. Comput., vol. 64, no. 12, pp. 3430–3443, Dec. 2015.
[6] Bethencourt J, Sahai A, Waters B. Ciphertext-policy attributebased encryption. In: Security and Privacy, 2007. SP’07. IEEE symposium on. IEEE; 2007. p. 321–34.
[7] S. Hohenberger and B. Waters, “Synchronized aggregate signatures from the RSA assumption,” in Proc. Annu. Int. Conf. Theory Appl. Cryptogr. Techn., Springer, 2018, pp. 197–229.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 by author(s) and Erytis Publishing Limited.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.













