EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy

被引:2
|
作者
Ma, Haobin [1 ]
Zhou, Dehua [1 ]
Li, Peng [1 ]
Wang, Xiaoming [1 ]
机构
[1] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
access control; data sharing; Attribute-Based Encryption; hidden policy; outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; INTERNET;
D O I
10.3390/s23094384
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As medical data become increasingly important in healthcare, it is crucial to have proper access control mechanisms, ensuring that sensitive data are only accessible to authorized users while maintaining privacy and security. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an attractive access control solution that can offer effective, fine-grained and secure medical data sharing, but it has two major drawbacks: Firstly, decryption is computationally expensive for resource-limited data users, especially when the access policy has many attributes, limiting its use in large-scale data-sharing scenarios. Secondly, existing schemes are based on data users' attributes, which can potentially reveal sensitive information about the users, especially in healthcare data sharing, where strong privacy and security are essential. To address these issues, we designed an improved CP-ABE scheme that provides efficient and verifiable outsourced access control with fully hidden policy named EVOAC-HP. In this paper, we utilize the attribute bloom filter to achieve policy hiding without revealing user privacy. For the purpose of alleviating the decryption burden for data users, we also adopt the technique of outsourced decryption to outsource the heavy computation overhead to the cloud service provider (CSP) with strong computing and storage capabilities, while the transformed ciphertext results can be verified by the data user. Finally, with rigorous security and reliable performance analysis, we demonstrate that EVOAC-HP is both practical and effective with robust privacy protection.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Revocable Identity-Based Access Control for Big Data with Verifiable outsourced Computing
    Xiong, Hu
    Choo, Kim-Kwang Raymond
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON BIG DATA, 2022, 8 (01) : 1 - 13
  • [22] Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ma, Hui
    Zhang, Rui
    Wan, Zhiguo
    Lu, Yao
    Lin, Suqing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 679 - 692
  • [23] An efficient polynomial-based verifiable computation scheme on multi-source outsourced data
    Zhang, Yiran
    Geng, Huizheng
    Su, Li
    He, Shen
    Lu, Li
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [24] CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy
    Helil, Nurmamat
    Rahman, Kaysar
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [25] Access control encryption with efficient verifiable sanitized decryption
    Wang, Huige
    Chen, Kefei
    Liu, Joseph K.
    Hu, Ziyuan
    Long, Yu
    INFORMATION SCIENCES, 2018, 465 : 72 - 85
  • [26] Verifiable searchable encryption scheme with flexible access control in the cloud
    Li, Yang
    Xu, Chungen
    Xu, Lei
    Mei, Lin
    Zhu, Yanzhe
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2025, 197
  • [27] Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing"
    Xiong, Hu
    Sun, Jianfei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (04) : 461 - 462
  • [28] A Lightweight Access Control Scheme Supporting Policy Hidden Based on Path Bloom Filter
    Luo, Chao
    Shi, Jiaoli
    Xie, Minchen
    Hu, Chao
    Wang, Lihua
    Mei, Zhuolin
    Yao, Shimao
    Li, Hui
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 433 - 451
  • [29] Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
    Du, Ruizhong
    Zhang, Tianhe
    Shi, Pengliang
    Tongxin Xuebao/Journal on Communications, 2022, 43 (06): : 168 - 178
  • [30] Efficient Key Management for Enforcing Access Control in Outsourced Scenarios
    Blundo, Carlo
    Cimato, Stelvio
    di Vimercati, Sabrina De Capitani
    De Santis, Alfredo
    Foresti, Sara
    Paraboschi, Stefano
    Samarati, Pierangela
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 364 - 375