Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud

被引:4
|
作者
Koe, Arthur S. Voundi [1 ]
Chen, Qi [1 ]
Tang, Juan [1 ]
Ai, Shan [1 ]
Yan, Hongyang [1 ]
Zhang, Shiwen [2 ]
Wong, Duncan S. [1 ]
机构
[1] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou 510006, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan, Peoples R China
基金
中国博士后科学基金;
关键词
attribute-based encryption; medical data; mobile cloud computing; outsourcing; revocation; ENCRYPTION; EFFICIENT; SCHEME; SECURE;
D O I
10.1002/int.23009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With recent advances in cloud computing, mobile devices are increasingly being used to record patient physiological parameters, and transfer them to a cloud-based hospital information system, for access control mediation over a variety of stakeholders. In such a cloud-based architecture, the patient must specify an access policy for a group of authorized parties towards its outsourced data. Multiauthority ciphertext-policy attribute-based encryption (CP-ABE) was provided as an innovative cloud-based access control cryptographic primitive to tackle the key escrow issue in a centralized architecture, and boost flexibility through cross-domain attributes management. Existing works, however, still have glaring drawbacks. First, they still rely on a trusted authority to generate and distribute user secret keys. Second, they do not simultaneously provide encryption, decryption, or revocation outsourcing, resulting in high processing and communication cost for both the data sender and the data receiver. Third, they do not support both user and attribute revocation, and the integrity of ciphertext downloaded from the cloud is not always verified at the user end. As a result, this paper exploits the dummy attribute technique and introduces a novel, efficient, and secure multiauthority ciphertext-policy ABE method for mediating access control over medical data, in the mobile cloud. The ciphertext access policy enforcement, partial ciphertext decryption, and both the user and attribute indirect revocation updates are safely outsourced to the cloud server in this study. Theoretical analysis demonstrates that our scheme is efficient and verifiable, and we prove that our construction is secure under the decisional bilinear Diffie-Hellman assumption.
引用
收藏
页码:9774 / 9797
页数:24
相关论文
共 50 条
  • [31] An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service
    Nyamsuren Vaanchig
    Wei Chen
    Zhi-Guang Qin
    Journal of Electronic Science and Technology, 2017, 15 (01) : 90 - 98
  • [32] Mobile access and flexible search over encrypted cloud data in heterogeneous systems
    Sun, Jianfei
    Xiong, Hu
    Zhang, Hao
    Peng, Li
    INFORMATION SCIENCES, 2020, 507 : 1 - 15
  • [33] Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things
    Huang, Kaiqing
    Wang, Xueli
    Lin, Zhiqiang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [34] DNA Similarity Search With Access Control Over Encrypted Cloud Data
    Xu, Guowen
    Li, Hongwei
    Ren, Hao
    Lin, Xiaodong
    Shen, Xuemin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) : 1233 - 1252
  • [35] Keyword Search with Access Control over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2014 IEEE 22ND INTERNATIONAL SYMPOSIUM OF QUALITY OF SERVICE (IWQOS), 2014, : 87 - 92
  • [36] Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems
    Li, Xiaoyu
    Tang, Shaohua
    Xu, Lingling
    Wang, Huaqun
    Chen, Jie
    IEEE ACCESS, 2017, 5 : 393 - 405
  • [37] Secure Cloud EHR with Semantic Access Control, Searchable Encryption and Attribute Revocation
    Walid, Redwan
    Joshi, Karuna P.
    Choi, Seung Geol
    2021 IEEE INTERNATIONAL CONFERENCE ON DIGITAL HEALTH (ICDH 2021), 2021, : 38 - 47
  • [38] CloudFile: A cloud data access control system based on mobile social trust
    Yan, Zheng
    Shi, Wangyang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 86 : 46 - 58
  • [39] Mobile medical data access system
    Hunaiti, Z
    Rahman, A
    Huneiti, Z
    Balachandran, W
    15TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND COMPUTERS, PROCEEDINGS, 2005, : 2 - 6
  • [40] A Flexible Access Control with User Revocation in Fog-Enabled Cloud Computing
    Nagarani, C.
    Kousalya, R.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 909 - 914