Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud

被引:4
|
作者
Koe, Arthur S. Voundi [1 ]
Chen, Qi [1 ]
Tang, Juan [1 ]
Ai, Shan [1 ]
Yan, Hongyang [1 ]
Zhang, Shiwen [2 ]
Wong, Duncan S. [1 ]
机构
[1] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou 510006, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan, Peoples R China
基金
中国博士后科学基金;
关键词
attribute-based encryption; medical data; mobile cloud computing; outsourcing; revocation; ENCRYPTION; EFFICIENT; SCHEME; SECURE;
D O I
10.1002/int.23009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With recent advances in cloud computing, mobile devices are increasingly being used to record patient physiological parameters, and transfer them to a cloud-based hospital information system, for access control mediation over a variety of stakeholders. In such a cloud-based architecture, the patient must specify an access policy for a group of authorized parties towards its outsourced data. Multiauthority ciphertext-policy attribute-based encryption (CP-ABE) was provided as an innovative cloud-based access control cryptographic primitive to tackle the key escrow issue in a centralized architecture, and boost flexibility through cross-domain attributes management. Existing works, however, still have glaring drawbacks. First, they still rely on a trusted authority to generate and distribute user secret keys. Second, they do not simultaneously provide encryption, decryption, or revocation outsourcing, resulting in high processing and communication cost for both the data sender and the data receiver. Third, they do not support both user and attribute revocation, and the integrity of ciphertext downloaded from the cloud is not always verified at the user end. As a result, this paper exploits the dummy attribute technique and introduces a novel, efficient, and secure multiauthority ciphertext-policy ABE method for mediating access control over medical data, in the mobile cloud. The ciphertext access policy enforcement, partial ciphertext decryption, and both the user and attribute indirect revocation updates are safely outsourced to the cloud server in this study. Theoretical analysis demonstrates that our scheme is efficient and verifiable, and we prove that our construction is secure under the decisional bilinear Diffie-Hellman assumption.
引用
收藏
页码:9774 / 9797
页数:24
相关论文
共 50 条
  • [1] Comments on "DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems"/Security Analysis of Attribute Revocation in Multiauthority Data Access Control for Cloud Storage Systems
    Hong, Jianan
    Xue, Kaiping
    Li, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1315 - 1317
  • [2] Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing
    Luo, Yuchuan
    Xu, Ming
    Huang, Kai
    Wang, Dongsheng
    Fu, Shaojing
    COMPUTERS & SECURITY, 2018, 73 : 492 - 506
  • [3] On the Security of Data Access Control for Multiauthority Cloud Storage Systems
    Wu, Xianglong
    Jiang, Rui
    Bhargava, Bharat
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (02) : 258 - 272
  • [4] An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System
    Cui, Jie
    Bian, Fengyu
    Zhong, Hong
    Zhang, Qingyang
    Xu, Sheng
    Gu, Chengjie
    Liu, Lu
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6569 - 6580
  • [5] Temporal Access Control with User Revocation for Cloud Data
    Balani, Nihal
    Ruj, Sushmita
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 336 - 342
  • [6] Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems
    Hur, Junbeom
    Noh, Dong Kun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) : 1214 - 1221
  • [7] Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
    Dong, Qiuxiang
    Huang, Dijiang
    Luo, Jim
    Kang, Myong
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [8] DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems
    Yang, Kan
    Jia, Xiaohua
    Ren, Kui
    Zhang, Bo
    Xie, Ruitao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (11) : 1790 - 1801
  • [9] Revocable Outsourcing Multi-Authority ABE for Medical Data in Mobile Cloud
    Koe, Arthur Sandor Voundi
    Tang, Juan
    Ai, Shan
    Yan, Hongyang
    Zhang, Shiwen
    IEEE CONGRESS ON CYBERMATICS / 2021 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS (ITHINGS) / IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) / IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) / IEEE SMART DATA (SMARTDATA), 2021, : 338 - 345
  • [10] Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 1731 - 1742