Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud

被引:4
|
作者
Koe, Arthur S. Voundi [1 ]
Chen, Qi [1 ]
Tang, Juan [1 ]
Ai, Shan [1 ]
Yan, Hongyang [1 ]
Zhang, Shiwen [2 ]
Wong, Duncan S. [1 ]
机构
[1] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou 510006, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan, Peoples R China
基金
中国博士后科学基金;
关键词
attribute-based encryption; medical data; mobile cloud computing; outsourcing; revocation; ENCRYPTION; EFFICIENT; SCHEME; SECURE;
D O I
10.1002/int.23009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With recent advances in cloud computing, mobile devices are increasingly being used to record patient physiological parameters, and transfer them to a cloud-based hospital information system, for access control mediation over a variety of stakeholders. In such a cloud-based architecture, the patient must specify an access policy for a group of authorized parties towards its outsourced data. Multiauthority ciphertext-policy attribute-based encryption (CP-ABE) was provided as an innovative cloud-based access control cryptographic primitive to tackle the key escrow issue in a centralized architecture, and boost flexibility through cross-domain attributes management. Existing works, however, still have glaring drawbacks. First, they still rely on a trusted authority to generate and distribute user secret keys. Second, they do not simultaneously provide encryption, decryption, or revocation outsourcing, resulting in high processing and communication cost for both the data sender and the data receiver. Third, they do not support both user and attribute revocation, and the integrity of ciphertext downloaded from the cloud is not always verified at the user end. As a result, this paper exploits the dummy attribute technique and introduces a novel, efficient, and secure multiauthority ciphertext-policy ABE method for mediating access control over medical data, in the mobile cloud. The ciphertext access policy enforcement, partial ciphertext decryption, and both the user and attribute indirect revocation updates are safely outsourced to the cloud server in this study. Theoretical analysis demonstrates that our scheme is efficient and verifiable, and we prove that our construction is secure under the decisional bilinear Diffie-Hellman assumption.
引用
收藏
页码:9774 / 9797
页数:24
相关论文
共 50 条
  • [41] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Xia, Zhihua
    Zhang, Liangao
    Liu, Dandan
    CHINA COMMUNICATIONS, 2016, 13 (07) : 92 - 99
  • [42] A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage
    Kim, Jongkil
    Nepal, Surya
    DATA SCIENCE AND ENGINEERING, 2016, 1 (03) : 149 - 160
  • [43] Role and Time-based Access Control with Efficient Revocation for Cloud Storage
    Li, Fenghua
    Wang, Yanchao
    Xiong, Jinbo
    Xie, Rongna
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 284 - 289
  • [44] A Cloud-Based Access Control Scheme with User Revocation and Attribute Update
    Zhang, Peng
    Chen, Zehong
    Liang, Kaitai
    Wang, Shulan
    Wang, Ting
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 525 - 540
  • [45] Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications
    Roy, Sandip
    Das, Ashok Kumar
    Chatterjee, Santanu
    Kumar, Neeraj
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (01) : 457 - 468
  • [46] GeoSecure: Towards Secure Outsourcing of GPS Data over Cloud
    Patil, Vikram
    Parikh, Shivam
    Singh, Priyanka
    Atrey, Pradeep K.
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 495 - 501
  • [47] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Zhihua Xia
    Liangao Zhang
    Dandan Liu
    中国通信, 2016, 13 (07) : 92 - 99
  • [48] A Data Outsourcing Architecture Combining Cryptography and Access Control
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Jajodia, Sushil
    Paraboschi, Stefano
    Samarati, Pierangela
    CSAW'07: PROCEEDINGS OF THE 2007 ACM COMPUTER SECURITY ARCHITECTURE WORKSHOP, 2007, : 63 - 69
  • [49] Blockchain based secure medical data outsourcing with data deduplication in cloud environment
    Benil, T.
    Jasper, J.
    COMPUTER COMMUNICATIONS, 2023, 209 : 1 - 13
  • [50] PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems
    Sethi, Kamalakanta
    Pradhan, Ankit
    Bera, Padmalochan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1525 - 1550