Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health

被引:67
|
作者
Sun, Jianfei [1 ,2 ]
Xiong, Hu [1 ]
Liu, Ximeng [3 ]
Zhang, Yinghui [4 ]
Nie, Xuyun [1 ]
Deng, Robert H. [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[2] Singapore Management Univ, Sch Informat & Syst, Singapore, Singapore
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[4] Xian Univ Post & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
基金
美国国家科学基金会;
关键词
Medical services; Encryption; Privacy; Access control; Data privacy; Internet of Things; Feasible; Internet of Things (IoT); policy hiding; privacy aware; smart health; HIDDEN-VECTOR ENCRYPTION; EFFICIENT;
D O I
10.1109/JIOT.2020.2974257
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the booming of Internet of Things (IoT), smart health (s-health) is becoming an emerging and attractive paradigm. It can provide an accurate prediction of various diseases and improve the quality of healthcare. Nevertheless, data security and user privacy concerns still remain issues to be addressed. As a high potential and prospective solution to secure IoT-oriented s-health applications, ciphertext policy attribute-based encryption (CP-ABE) schemes raise challenges, such as heavy overhead and attribute privacy of the end users. To resolve these drawbacks, an optimized vector transformation approach is first proposed to efficiently transform the access policy and user attribute set into respective vectors of shorter length while other approaches result in redundant and longer vectors. Our transformation approach can greatly relieve the costly overheard of key generation, encryption, and decryption phases. Then, based on the transformation approach and the offline/online computation technology, we propose a lightweight policy-hiding CP-ABE scheme for the IoT-oriented s-health application. With our proposed scheme, data users in the s-health system can perform lightweight encryption and decryption without leaking any sensitive privacy about the attributes of the user. Finally, the formal security analysis, the theoretic performance evaluation and experiment results indicate that the solution is secure and efficient.
引用
收藏
页码:6566 / 6575
页数:10
相关论文
共 50 条
  • [41] A Lightweight Fine-Grained Access Control Scheme with Forward Security for Mobile Crowdsourcing
    Hong, Keyong
    Wang, Tao
    Wang, Zhichao
    Wang, Jintang
    2024 2ND INTERNATIONAL CONFERENCE ON MOBILE INTERNET, CLOUD COMPUTING AND INFORMATION SECURITY, MICCIS 2024, 2024, : 195 - 203
  • [42] Fine-Grained Access Control for Microservices
    Nehme, Antonio
    Jesus, Vitor
    Mahbub, Khaled
    Abdallah, Ali
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 285 - 300
  • [43] Fine-Grained Access Control for Electronic Health Record Systems
    Pham Thi Bach Hue
    Wohlgemuth, Sven
    Echizen, Isao
    Dong Thi Bich Thuy
    Nguyen Dinh Thu
    U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2010, 124 : 31 - +
  • [44] A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing
    Fugkeaw, Somchart
    IEEE ACCESS, 2021, 9 : 836 - 848
  • [45] Secure IoT Data Outsourcing With Aggregate Statistics and Fine-Grained Access Control
    Liu, Ling
    Wang, He
    Zhang, Yuqing
    IEEE ACCESS, 2020, 8 : 95057 - 95067
  • [46] HITC: Data Privacy in Online Social Networks with Fine-Grained Access Control
    Abdulla, Ahmed Khalil
    Bakiras, Spiridon
    PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, : 123 - 134
  • [47] A Fine-Grained Access Control Scheme in Fog-IoT Based Environment
    Derki, Mohamed Saddek
    Taboudjemat-Nouali, Nadia
    Nouali, Omar
    ADVANCED INTELLIGENT SYSTEMS FOR SUSTAINABLE DEVELOPMENT (AI2SD'2020), VOL 2, 2022, 1418 : 465 - 474
  • [48] A Fine-grained Dynamic Access Control Method for Power IoT Based on Kformer
    Qiu, Rixuan
    Xue, Xue
    Chen, Mingliang
    Zheng, Jinkun
    Jing, Sitong
    Li, Yuancheng
    INFOCOMMUNICATIONS JOURNAL, 2022, 14 (04): : 79 - 85
  • [49] Access Control in Adversarial Environments for IoT-oriented Distributed Ledgers
    Cullen, Andrew
    Ferraro, Pietro
    Shorten, Robert
    Sanders, William
    Vigneri, Luigi
    2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), 2021, : 968 - 973
  • [50] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Calo, Seraphin B.
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 35 - 43