EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy

被引:2
|
作者
Ma, Haobin [1 ]
Zhou, Dehua [1 ]
Li, Peng [1 ]
Wang, Xiaoming [1 ]
机构
[1] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
access control; data sharing; Attribute-Based Encryption; hidden policy; outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; INTERNET;
D O I
10.3390/s23094384
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As medical data become increasingly important in healthcare, it is crucial to have proper access control mechanisms, ensuring that sensitive data are only accessible to authorized users while maintaining privacy and security. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an attractive access control solution that can offer effective, fine-grained and secure medical data sharing, but it has two major drawbacks: Firstly, decryption is computationally expensive for resource-limited data users, especially when the access policy has many attributes, limiting its use in large-scale data-sharing scenarios. Secondly, existing schemes are based on data users' attributes, which can potentially reveal sensitive information about the users, especially in healthcare data sharing, where strong privacy and security are essential. To address these issues, we designed an improved CP-ABE scheme that provides efficient and verifiable outsourced access control with fully hidden policy named EVOAC-HP. In this paper, we utilize the attribute bloom filter to achieve policy hiding without revealing user privacy. For the purpose of alleviating the decryption burden for data users, we also adopt the technique of outsourced decryption to outsource the heavy computation overhead to the cloud service provider (CSP) with strong computing and storage capabilities, while the transformed ciphertext results can be verified by the data user. Finally, with rigorous security and reliable performance analysis, we demonstrate that EVOAC-HP is both practical and effective with robust privacy protection.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] KP-ABE based Verifiable Cloud Access Control Scheme
    Si, Xiaolin
    Wang, Pengpian
    Zhang, Liwu
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 34 - 41
  • [32] A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
    Hu, Chunqiang
    Li, Wei
    Cheng, Xiuzhen
    Yu, Jiguo
    Wang, Shengling
    Bie, Rongfang
    IEEE TRANSACTIONS ON BIG DATA, 2018, 4 (03) : 341 - 355
  • [33] Scalable and secure access control policy update for outsourced big data
    Fugkeaw, Somchart
    Sato, Hiroyuki
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 79 : 364 - 373
  • [34] A verifiable hidden policy CP-ABE with decryption testing scheme and its application in VANET
    Zhao, Yang
    Zhang, Xing
    Xie, Xin
    Ding, Yi
    Kumar, Sachin
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (05)
  • [35] Verifiable Cloud-Based Data Publish-Subscribe Service With Hidden Access Policy
    Li, Chunlin
    Li, Jinguo
    Zhang, Kai
    Yan, Yan
    Ning, Jianting
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3737 - 3749
  • [36] FOC-PH-CP-ABE: An Efficient CP-ABE Scheme With Fully Outsourced Computation and Policy Hidden in the Industrial Internet of Things
    Luo, Wei
    Lv, Ziyi
    Yang, Laipu
    Han, Gang
    Zhang, Xiaoli
    IEEE SENSORS JOURNAL, 2024, 24 (18) : 28971 - 28981
  • [37] Vspp: Verifiable, shareable, and privacy-preserving access control scheme for IoV
    Sun, Youwang
    Jin, Chunhua
    Liu, Xinying
    Kong, Lingwen
    Yu, Changhui
    Chen, Guanhua
    Chen, Liqing
    PERVASIVE AND MOBILE COMPUTING, 2025, 107
  • [38] OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems
    Zhang, Jiale
    Cheng, Zhen
    Cheng, Xiang
    Chen, Bing
    CONNECTION SCIENCE, 2021, 33 (04) : 1060 - 1076
  • [39] OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT
    Yang, Yunbo
    Hu, Yiwei
    Dong, Xiaolei
    Shen, Jiachen
    Cao, Zhenfu
    Yang, Guomin
    Deng, Robert H.
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 13793 - 13809
  • [40] Decentralizing Multi-Authority Attribute-Based Access Control Scheme with Fully Hidden Policy
    Zhang, Leyou
    Ren, Juan
    Kang, Li
    Wang, Baocang
    International Journal of Network Security, 2021, 23 (04) : 588 - 603