An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System

被引:0
|
作者
Vanga Odelu
Ashok Kumar Das
Adrijit Goswami
机构
[1] Rajiv Gandhi University of Knowledge Technologies,Department of Mathematics
[2] International Institute of Information Technology,Center for Security, Theory and Algorithmic Research
[3] Indian Institute of Technology,Department of Mathematics
来源
关键词
Access control; Key management; Symmetric-key cryptosystem; User hierarchy; Hash function; Security; E-medicine;
D O I
暂无
中图分类号
学科分类号
摘要
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against ‘man-in-the-middle attack’ or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.’s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu–Chen’s scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu–Chen’s scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu–Chen’s scheme, Nikooghadam–Zakerolhosseini’s scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.
引用
收藏
相关论文
共 50 条
  • [1] An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
  • [2] An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
    Wu, Shuhua
    Chen, Kefei
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (04) : 2325 - 2337
  • [3] An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
    Shuhua Wu
    Kefei Chen
    [J]. Journal of Medical Systems, 2012, 36 : 2325 - 2337
  • [4] An improved key-management scheme for hierarchical access control
    Chao W.-Y.
    Tsai C.-Y.
    Hwang M.-S.
    [J]. International Journal of Network Security, 2017, 19 (04) : 639 - 643
  • [5] Extended chaotic map-based key management for hierarchical access control in e-medicine systems
    Tian-Fu Lee
    I-Pin Chang
    Jyun-Guo Wang
    Yen-Chang Chen
    Sheng-Tzung Tsai
    Rui-Yu Chen
    [J]. Peer-to-Peer Networking and Applications, 2024, 17 : 858 - 870
  • [6] Extended chaotic map-based key management for hierarchical access control in e-medicine systems
    Lee, Tian-Fu
    Chang, I-Pin
    Wang, Jyun-Guo
    Chen, Yen-Chang
    Tsai, Sheng-Tzung
    Chen, Rui-Yu
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (02) : 858 - 870
  • [7] An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
    Jeng, Fuh-Gwo
    Wang, Chung-Ming
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (08) : 1161 - 1167
  • [8] Review of hierarchical database access control for E-medicine systems
    Lee, Tian-Fu
    Wang, Jyun-Guo
    Chen, Yen-Chang
    [J]. TZU CHI MEDICAL JOURNAL, 2023, 35 (02): : 143 - 147
  • [9] A Secure Key Management Scheme for Hierarchical Access Control with Secret Key Validity Checking
    Abi-Char, Pierre E.
    Nader, Patrick
    Mahfouz, Sandy
    [J]. 2021 44TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2021, : 27 - 33
  • [10] Hierarchical Key Management Scheme with Multilevel Secure Access
    Ma, Mingxin
    Yang, Xiaotong
    Shi, Guozhen
    Li, Fenghua
    [J]. 2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, : 97 - 102