Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud

被引:4
|
作者
Koe, Arthur S. Voundi [1 ]
Chen, Qi [1 ]
Tang, Juan [1 ]
Ai, Shan [1 ]
Yan, Hongyang [1 ]
Zhang, Shiwen [2 ]
Wong, Duncan S. [1 ]
机构
[1] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou 510006, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan, Peoples R China
基金
中国博士后科学基金;
关键词
attribute-based encryption; medical data; mobile cloud computing; outsourcing; revocation; ENCRYPTION; EFFICIENT; SCHEME; SECURE;
D O I
10.1002/int.23009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With recent advances in cloud computing, mobile devices are increasingly being used to record patient physiological parameters, and transfer them to a cloud-based hospital information system, for access control mediation over a variety of stakeholders. In such a cloud-based architecture, the patient must specify an access policy for a group of authorized parties towards its outsourced data. Multiauthority ciphertext-policy attribute-based encryption (CP-ABE) was provided as an innovative cloud-based access control cryptographic primitive to tackle the key escrow issue in a centralized architecture, and boost flexibility through cross-domain attributes management. Existing works, however, still have glaring drawbacks. First, they still rely on a trusted authority to generate and distribute user secret keys. Second, they do not simultaneously provide encryption, decryption, or revocation outsourcing, resulting in high processing and communication cost for both the data sender and the data receiver. Third, they do not support both user and attribute revocation, and the integrity of ciphertext downloaded from the cloud is not always verified at the user end. As a result, this paper exploits the dummy attribute technique and introduces a novel, efficient, and secure multiauthority ciphertext-policy ABE method for mediating access control over medical data, in the mobile cloud. The ciphertext access policy enforcement, partial ciphertext decryption, and both the user and attribute indirect revocation updates are safely outsourced to the cloud server in this study. Theoretical analysis demonstrates that our scheme is efficient and verifiable, and we prove that our construction is secure under the decisional bilinear Diffie-Hellman assumption.
引用
收藏
页码:9774 / 9797
页数:24
相关论文
共 50 条
  • [21] FACOR:Flexible Access Control with Outsourceable Revocation in Mobile Clouds
    ZHOU Shungan
    DU Ruiying
    CHEN Jing
    SHEN Jian
    DENG Hua
    ZHANG Huanguo
    中国通信, 2016, 13 (04) : 136 - 150
  • [22] FACOR: Flexible Access Control with Outsourceable Revocation in Mobile Clouds
    Zhou Shungan
    Du Ruiying
    Chen Jing
    Shen Jian
    Deng Hua
    Zhang Huanguo
    CHINA COMMUNICATIONS, 2016, 13 (04) : 136 - 150
  • [23] An Efficient User's Attribute Revocation Scheme Suitable for Data Outsourcing in Cloud Storage
    Zheng, Fang
    Peng, Xinguang
    Li, Zhidan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [24] Keyword Search With Access Control Over Encrypted Cloud Data
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    IEEE SENSORS JOURNAL, 2017, 17 (03) : 858 - 868
  • [25] Multidata-Owner Searchable Encryption Scheme Over Medical Cloud Data With Efficient Access Control
    Abdelfattah, Sherif
    Baza, Mohamed
    Mahmoud, Mohamed M. E. A.
    Fouda, Mostafa M.
    Abualsaud, Khalid A.
    Guizani, Mohsen
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 5067 - 5078
  • [26] A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing
    Jin, Yu
    Tian, Chuan
    He, Heng
    Wang, Fan
    PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, : 172 - 179
  • [27] Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage
    Qi, Saiyu
    Wei, Wei
    Wang, Jianfeng
    Sun, Shifeng
    Rutkowski, Leszek
    Huang, Tingwen
    Kacprzyk, Janusz
    Qi, Yong
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (04) : 2566 - 2582
  • [28] Method of secure, scalable, and fine-grained data access control with efficient revocation in untrusted cloud
    Song Lingwei
    Yu Fang
    Zhang Ru
    Niu Xinxin
    The Journal of China Universities of Posts and Telecommunications, 2015, (02) : 38 - 43
  • [29] Method of secure, scalable, and fine-grained data access control with efficient revocation in untrusted cloud
    Song Lingwei
    Yu Fang
    Zhang Ru
    Niu Xinxin
    The Journal of China Universities of Posts and Telecommunications, 2015, 22 (02) : 38 - 43
  • [30] A Fine Grained Access Control and Flexible Revocation Scheme for Data Security on Public Cloud Storage Services
    Eissa, Tameem
    Cho, Gi-Hwan
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 27 - 33