EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy

被引:2
|
作者
Ma, Haobin [1 ]
Zhou, Dehua [1 ]
Li, Peng [1 ]
Wang, Xiaoming [1 ]
机构
[1] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
access control; data sharing; Attribute-Based Encryption; hidden policy; outsourced decryption; ATTRIBUTE-BASED ENCRYPTION; INTERNET;
D O I
10.3390/s23094384
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As medical data become increasingly important in healthcare, it is crucial to have proper access control mechanisms, ensuring that sensitive data are only accessible to authorized users while maintaining privacy and security. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an attractive access control solution that can offer effective, fine-grained and secure medical data sharing, but it has two major drawbacks: Firstly, decryption is computationally expensive for resource-limited data users, especially when the access policy has many attributes, limiting its use in large-scale data-sharing scenarios. Secondly, existing schemes are based on data users' attributes, which can potentially reveal sensitive information about the users, especially in healthcare data sharing, where strong privacy and security are essential. To address these issues, we designed an improved CP-ABE scheme that provides efficient and verifiable outsourced access control with fully hidden policy named EVOAC-HP. In this paper, we utilize the attribute bloom filter to achieve policy hiding without revealing user privacy. For the purpose of alleviating the decryption burden for data users, we also adopt the technique of outsourced decryption to outsource the heavy computation overhead to the cloud service provider (CSP) with strong computing and storage capabilities, while the transformed ciphertext results can be verified by the data user. Finally, with rigorous security and reliable performance analysis, we demonstrate that EVOAC-HP is both practical and effective with robust privacy protection.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures
    Cui, Hui
    Deng, Robert H.
    Wu, Guowei
    Lai, Junzuo
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 19 - 38
  • [42] CP-ABE scheme supporting partially hidden access policy
    Liu, Xia
    Wang, Xinzu
    Zhang, Tao
    Chen, Yingge
    Wang, Rong
    Feng, Chaosheng
    Qin, Zhiguang
    Tongxin Xuebao/Journal on Communications, 2024, 45 (10): : 180 - 190
  • [43] Privacy preserved secured outsourced cloud data access control scheme with efficient multi-authority attribute based signcryption
    Debnath, Somen
    Bhuyan, Bubu
    Saha, Anish Kumar
    MULTIAGENT AND GRID SYSTEMS, 2020, 16 (04) : 409 - 432
  • [44] Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud
    Yang, Kan
    Jia, Xiaohua
    Ren, Kui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (12) : 3461 - 3470
  • [45] An efficient access control scheme for smart campus
    Niu, Yiru
    Jiang, Hong
    Tian, Bo
    Xiang, Hong
    Liu, Yiming
    Xia, Xiaofeng
    Zhao, Yue
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2022, 9 (06)
  • [46] An Efficient Access Control Scheme for Cloud Environment
    Tu, Shan-Shan
    Niu, Shao-Zhang
    Li, Meng-Jiao
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2013, 13 (03) : 77 - 90
  • [47] An efficient, secure and verifiable conjunctive keyword search scheme based on rank metric codes over encrypted outsourced cloud data
    Yousefipoor, Vahid
    Eghlidos, Taraneh
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [48] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    SOFT COMPUTING, 2018, 22 (01) : 243 - 251
  • [49] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Hong Zhong
    Wenlong Zhu
    Yan Xu
    Jie Cui
    Soft Computing, 2018, 22 : 243 - 251
  • [50] An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited
    Cui, Hui
    Deng, Robert H.
    Lai, Junzuo
    Yi, Xun
    Nepal, Surya
    COMPUTER NETWORKS, 2018, 133 : 157 - 165