Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud

被引:4
|
作者
Koe, Arthur S. Voundi [1 ]
Chen, Qi [1 ]
Tang, Juan [1 ]
Ai, Shan [1 ]
Yan, Hongyang [1 ]
Zhang, Shiwen [2 ]
Wong, Duncan S. [1 ]
机构
[1] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou 510006, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan, Peoples R China
基金
中国博士后科学基金;
关键词
attribute-based encryption; medical data; mobile cloud computing; outsourcing; revocation; ENCRYPTION; EFFICIENT; SCHEME; SECURE;
D O I
10.1002/int.23009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With recent advances in cloud computing, mobile devices are increasingly being used to record patient physiological parameters, and transfer them to a cloud-based hospital information system, for access control mediation over a variety of stakeholders. In such a cloud-based architecture, the patient must specify an access policy for a group of authorized parties towards its outsourced data. Multiauthority ciphertext-policy attribute-based encryption (CP-ABE) was provided as an innovative cloud-based access control cryptographic primitive to tackle the key escrow issue in a centralized architecture, and boost flexibility through cross-domain attributes management. Existing works, however, still have glaring drawbacks. First, they still rely on a trusted authority to generate and distribute user secret keys. Second, they do not simultaneously provide encryption, decryption, or revocation outsourcing, resulting in high processing and communication cost for both the data sender and the data receiver. Third, they do not support both user and attribute revocation, and the integrity of ciphertext downloaded from the cloud is not always verified at the user end. As a result, this paper exploits the dummy attribute technique and introduces a novel, efficient, and secure multiauthority ciphertext-policy ABE method for mediating access control over medical data, in the mobile cloud. The ciphertext access policy enforcement, partial ciphertext decryption, and both the user and attribute indirect revocation updates are safely outsourced to the cloud server in this study. Theoretical analysis demonstrates that our scheme is efficient and verifiable, and we prove that our construction is secure under the decisional bilinear Diffie-Hellman assumption.
引用
收藏
页码:9774 / 9797
页数:24
相关论文
共 50 条
  • [11] Efficient Outsourced Data Access Control with User Revocation for Cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Liu, Jian
    Xian, Ming
    Shen, Xuemin
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [12] Efficient and scalable outsourced data access control with user revocation in cloud: A comprehensive study
    Debnath, S.
    Bhuyan, B.
    MULTIAGENT AND GRID SYSTEMS, 2018, 14 (04) : 383 - 401
  • [13] A survey of attribute-based access control with user revocation in cloud data storage
    Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [14] Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud
    Kaushik, Shweta
    Gandhi, Charu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (02) : 29 - 52
  • [15] Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud
    Yang, Kan
    Jia, Xiaohua
    Ren, Kui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (12) : 3461 - 3470
  • [16] OUTSOURCING COMPUTATIONS THROUGH SMITH NORMAL FORM WITH ACCESS CONTROL
    Umadevi, C. N.
    Gopalan, N. P.
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 350 - 353
  • [17] Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile data to Cloud
    Sujithra, M.
    Padmavathi, G.
    Narayanan, Sathya
    GRAPH ALGORITHMS, HIGH PERFORMANCE IMPLEMENTATIONS AND ITS APPLICATIONS (ICGHIA 2014), 2015, 47 : 480 - 485
  • [18] SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage
    Xiong, Shuming
    Ni, Qiang
    Wang, Liangmin
    Wang, Qian
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 2914 - 2927
  • [19] Access Privilege Elevation and Revocation in Collusion-Resistant Cloud Access Control
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    PROCEEDINGS OF THE 2018 SECOND WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4), 2018, : 209 - 214
  • [20] ABEBox: A data driven access control for securing public cloud storage with efficient key revocation
    Raso, Emanuele
    Bracciale, Lorenzo
    Loreti, Pierpaolo
    Bianchi, Giuseppe
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,