A revocable attribute-based access control with non-monotonic access structure

被引:1
|
作者
Ashouri-Talouki, Maede [1 ]
Kahani, Nafiseh [2 ]
Barati, Masoud [3 ]
Abedini, Zomorod [1 ]
机构
[1] Univ Isfahan, Dept Informat Technol, Esfahan, Iran
[2] Carleton Univ, Syst & Comp Engn, Ottawa, ON, Canada
[3] Carleton Univ, Sch Informat Technol, Ottawa, ON, Canada
关键词
ABE access control; Non-monotonic access structure; Cloud computing; Privacy; Attribute revocation; HealthIoT systems; EFFICIENT; ENCRYPTION;
D O I
10.1007/s12243-024-01052-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) has revolutionized data manipulation across various applications, particularly in online healthcare paradigm, where medical data are collected and processed for remote monitoring and analysis. To improve the privacy and security of such sensitive healthcare data, the attribute-based encryption (ABE) with non-monotonic access policies has recently provided a fine-grained access control within cloud and IoT-based healthcare ecosystems. Specifically, the adoption of multi-authority ABE with untrusted authorities has eliminated the need for a trusted authority. However, ensuring the privacy of user's identity and attribute sets from these untrusted authorities remains a significant challenge in this context. To address this challenge, this paper introduces an enhanced multi-authority ABE approach, incorporating a robust attribute revocation mechanism. This enhancement safeguards user's identity and attribute-set privacy while remaining resilient against collusion attacks and ensuring backward secrecy. Moreover, the proposed approach provides non-monotonic access policies, which supports positive and negative constraints using NOT operation as well as AND and OR operations.
引用
收藏
页码:833 / 842
页数:10
相关论文
共 50 条
  • [21] Monotonicity and completeness in attribute-based access control
    Crampton, Jason
    Morisset, Charles
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 : 33 - 48
  • [22] Supporting attribute-based access control with ontologies
    Priebe, Torsten
    Dobmeier, Wolfgang
    Kamprath, Nora
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 465 - +
  • [23] Attribute-Based Access Control in Web Applications
    Kauser, Sadia
    Rahman, Ayesha
    Khan, Asad Mohammed
    Ahmad, Tameem
    APPLICATIONS OF ARTIFICIAL INTELLIGENCE TECHNIQUES IN ENGINEERING, SIGMA 2018, VOL 1, 2019, 698 : 385 - 393
  • [24] Attribute-Based Access Control for NoSQL Databases
    Gupta, Eeshan
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 317 - 319
  • [25] ANALYSIS OF THE METHODS FOR ATTRIBUTE-BASED ACCESS CONTROL
    Kalimoldayev, M. N.
    Biyashev, R. G.
    Rog, O. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2019, (44): : 43 - 57
  • [26] Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control
    Wang, Shangping
    Zhang, Xia
    Zhang, Yaling
    IET INFORMATION SECURITY, 2018, 12 (02) : 141 - 149
  • [27] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [28] Policy Extraction and Optimization with Access Logs for Attribute-based Access Control
    Sun, Wei
    Li, Long
    Hu, Ying
    Journal of Network Intelligence, 2023, 8 (03): : 932 - 947
  • [29] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [30] Enabling Attribute-Based Access Control in NoSQL Databases
    Gupta, Eeshan
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) : 208 - 223