Fine-grained multi-authority access control in IoT-enabled mHealth

被引:25
|
作者
Li, Qi [1 ]
Zhu, Hongbo [2 ]
Xiong, Jinbo [3 ]
Mo, Ruo [4 ]
Ying, Zuobin [5 ]
Wang, Huaqun [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Jiangsu Innovat Coordinat Ctr Internet Things, Nanjing 210003, Jiangsu, Peoples R China
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Fujian, Peoples R China
[4] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[5] Anhui Univ, Sch Comp Sci & Technol, Hefei 230601, Anhui, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Mobile healthcare; Attribute-based encryption; Access control; Multiple authorities; Efficient decryption; ATTRIBUTE-BASED ENCRYPTION; PRIVACY; SECURE; SCHEME; CONVERTER; EFFICIENT;
D O I
10.1007/s12243-018-00702-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the popularity of Internet of Things (IoT) and cloud computing technologies, mobile healthcare (mHealth) can offer remote, accurate, and effective medical services for patients according to their personal health records (PHRs). However, data security and efficient access of the PHR should be addressed. Attribute-based encryption (ABE) is regarded as a well-received cryptographic mechanism to simultaneously realize fine-grained access control and data confidentiality in mHealth. Nevertheless, existing works are either constructed in the single-authority setting which may be a performance bottleneck, or lack of efficient user decryption. In this paper, we propose SEMAAC, a secure and efficient multi-authority access control system for IoT-enabled mHealth. In SEMAAC, there are multiple independently worked attribute authorities (AAs). A new entity could be an AA without re-building the system. To reduce the user decryption overhead, most decryption is executed in cloud server, which whereafter returns a partial decryption ciphertext (PDC). The AAs can help the user to check if the PDC is correctly computed. Additionally, a restricted user can delegate his/her key to someone to outsource the decryption and check the returned result, without exposing the plaintext PHR file. The proposed SEMAAC is proved to be adaptively secure in the standard model. The numerical analysis and extensive experiments illustrate the efficiency and advantage of our scheme.
引用
收藏
页码:389 / 400
页数:12
相关论文
共 50 条
  • [21] Knowledge Discovery on IoT-Enabled mHealth Applications
    Menychtas, Andreas
    Tsanakas, Panayiotis
    Maglogiannis, Ilias
    GENEDIS 2018: COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2020, 1194 : 181 - 191
  • [22] Fine-Grained Access Control for Microservices
    Nehme, Antonio
    Jesus, Vitor
    Mahbub, Khaled
    Abdallah, Ali
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 285 - 300
  • [23] Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone
    Lee, Seungho
    Jo, Hyo Jin
    Choi, Wonsuk
    Kim, Hyoseung
    Park, Jong Hwan
    Lee, Dong Hoon
    IEEE ACCESS, 2020, 8 (08): : 81348 - 81364
  • [24] Fine-grained access control policy in blockchain-enabled edge computing
    He, Guangxuan
    Li, Chunlin
    Shu, Yong
    Luo, Youlong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 221
  • [25] Secure IoT Data Outsourcing With Aggregate Statistics and Fine-Grained Access Control
    Liu, Ling
    Wang, He
    Zhang, Yuqing
    IEEE ACCESS, 2020, 8 : 95057 - 95067
  • [26] A Fine-Grained Access Control Scheme in Fog-IoT Based Environment
    Derki, Mohamed Saddek
    Taboudjemat-Nouali, Nadia
    Nouali, Omar
    ADVANCED INTELLIGENT SYSTEMS FOR SUSTAINABLE DEVELOPMENT (AI2SD'2020), VOL 2, 2022, 1418 : 465 - 474
  • [27] A Fine-grained Dynamic Access Control Method for Power IoT Based on Kformer
    Qiu, Rixuan
    Xue, Xue
    Chen, Mingliang
    Zheng, Jinkun
    Jing, Sitong
    Li, Yuancheng
    INFOCOMMUNICATIONS JOURNAL, 2022, 14 (04): : 79 - 85
  • [28] Reliable Access Control for Multi-authority in Cloud Storage
    Ren, Yongjun
    Yang, Zhenqi
    Wang, Jin
    Fang, Liming
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 113 - 116
  • [29] MULTI-AUTHORITY TRUST ACCESS CONTROL FOR CLOUD STORAGE
    Riad, Khaled
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 429 - 433
  • [30] Revocable, Decentralized Multi-authority Access Control System
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING COMPANION (UCC COMPANION), 2018, : 220 - 225