EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy

被引:2
|
作者
Ma, Haobin [1 ]
Zhou, Dehua [1 ]
Li, Peng [1 ]
Wang, Xiaoming [1 ]
机构
[1] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
access control; data sharing; Attribute-Based Encryption; hidden policy; outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; INTERNET;
D O I
10.3390/s23094384
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As medical data become increasingly important in healthcare, it is crucial to have proper access control mechanisms, ensuring that sensitive data are only accessible to authorized users while maintaining privacy and security. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an attractive access control solution that can offer effective, fine-grained and secure medical data sharing, but it has two major drawbacks: Firstly, decryption is computationally expensive for resource-limited data users, especially when the access policy has many attributes, limiting its use in large-scale data-sharing scenarios. Secondly, existing schemes are based on data users' attributes, which can potentially reveal sensitive information about the users, especially in healthcare data sharing, where strong privacy and security are essential. To address these issues, we designed an improved CP-ABE scheme that provides efficient and verifiable outsourced access control with fully hidden policy named EVOAC-HP. In this paper, we utilize the attribute bloom filter to achieve policy hiding without revealing user privacy. For the purpose of alleviating the decryption burden for data users, we also adopt the technique of outsourced decryption to outsource the heavy computation overhead to the cloud service provider (CSP) with strong computing and storage capabilities, while the transformed ciphertext results can be verified by the data user. Finally, with rigorous security and reliable performance analysis, we demonstrate that EVOAC-HP is both practical and effective with robust privacy protection.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] An Efficient Access Control Scheme for Outsourced Data
    Wang, Xiaoming
    Lin, Yanchun
    JOURNAL OF COMPUTERS, 2012, 7 (04) : 918 - 922
  • [2] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    SENSORS, 2017, 17 (07)
  • [3] An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
    Li, Zhidan
    Li, Wenmin
    Jin, Zhengping
    Zhang, Hua
    Wen, Qiaoyan
    IEEE ACCESS, 2019, 7 : 29023 - 29037
  • [4] Comment on "An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption"
    Guo, Zhen
    Liu, Bin
    Zhao, Kaiqiang
    Feng, Chaosheng
    IEEE ACCESS, 2020, 8 : 202483 - 202486
  • [5] Efficient RAM and Control Flow in Verifiable Outsourced Computation
    Wahby, Riad S.
    Setty, Srinath
    Ren, Zuocheng
    Blumberg, Andrew J.
    Walfish, Michael
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [6] An efficient key management scheme for user access control in outsourced databases
    Hong, Seungtae
    Kim, Hyeong-Il
    Chang, Jae-Woo
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2017, 20 (03): : 467 - 490
  • [7] An efficient key management scheme for user access control in outsourced databases
    Seungtae Hong
    Hyeong-Il Kim
    Jae-Woo Chang
    World Wide Web, 2017, 20 : 467 - 490
  • [8] An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing
    Li, Jing
    Guan, Zhitao
    Du, Xiaojiang
    Zhang, Zijian
    Wu, Jun
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [9] Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext
    Su, Zelin
    Zhang, Wenfang
    Wang, Xiaomin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (12): : 3088 - 3097
  • [10] A blockchain based access control scheme with hidden policy and attribute
    Wu, Nannan
    Xu, Lei
    Zhu, Liehuang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 141 : 186 - 196