A revocable attribute-based access control with non-monotonic access structure

被引:1
|
作者
Ashouri-Talouki, Maede [1 ]
Kahani, Nafiseh [2 ]
Barati, Masoud [3 ]
Abedini, Zomorod [1 ]
机构
[1] Univ Isfahan, Dept Informat Technol, Esfahan, Iran
[2] Carleton Univ, Syst & Comp Engn, Ottawa, ON, Canada
[3] Carleton Univ, Sch Informat Technol, Ottawa, ON, Canada
关键词
ABE access control; Non-monotonic access structure; Cloud computing; Privacy; Attribute revocation; HealthIoT systems; EFFICIENT; ENCRYPTION;
D O I
10.1007/s12243-024-01052-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) has revolutionized data manipulation across various applications, particularly in online healthcare paradigm, where medical data are collected and processed for remote monitoring and analysis. To improve the privacy and security of such sensitive healthcare data, the attribute-based encryption (ABE) with non-monotonic access policies has recently provided a fine-grained access control within cloud and IoT-based healthcare ecosystems. Specifically, the adoption of multi-authority ABE with untrusted authorities has eliminated the need for a trusted authority. However, ensuring the privacy of user's identity and attribute sets from these untrusted authorities remains a significant challenge in this context. To address this challenge, this paper introduces an enhanced multi-authority ABE approach, incorporating a robust attribute revocation mechanism. This enhancement safeguards user's identity and attribute-set privacy while remaining resilient against collusion attacks and ensuring backward secrecy. Moreover, the proposed approach provides non-monotonic access policies, which supports positive and negative constraints using NOT operation as well as AND and OR operations.
引用
收藏
页码:833 / 842
页数:10
相关论文
共 50 条
  • [1] Attribute-Based Encryption with Non-Monotonic Access Structures
    Ostrovsky, Rafail
    Sahai, Amit
    Waters, Brent
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 195 - +
  • [2] Ciphertext-Policy Attribute-Based Encryption with Non-Monotonic Access Structure
    Jia Hong-Yong
    Chen Yue
    Mao Xiu-Qing
    Dou Rui-Yu
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL IV, 2010, : 484 - 487
  • [3] Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow
    Zhou, Yan
    Peng, Changgen
    Tian, Youliang
    Li, Zuolong
    Tan, Weijie
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (05): : 1625 - 1635
  • [4] Revocable attribute-based access control in mutli-autority systems
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 122 : 61 - 76
  • [5] A Revocable and Fair Outsourcing Attribute-Based Access Control Scheme in Metaverse
    Ruan, Conghao
    Hu, Chunqiang
    Li, Xingwang
    Deng, Shaojiang
    Liu, Zewei
    Yu, Jiguo
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 3781 - 3791
  • [6] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [7] A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
    Yamada, Shota
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Kunihiro, Noboru
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 275 - 292
  • [8] A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access
    Zhang, Kai
    Li, Yanping
    Song, Yun
    Lu, Laifeng
    Zhang, Tao
    Jiang, Qi
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [9] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [10] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +