An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System

被引:0
|
作者
Vanga Odelu
Ashok Kumar Das
Adrijit Goswami
机构
[1] Rajiv Gandhi University of Knowledge Technologies,Department of Mathematics
[2] International Institute of Information Technology,Center for Security, Theory and Algorithmic Research
[3] Indian Institute of Technology,Department of Mathematics
来源
关键词
Access control; Key management; Symmetric-key cryptosystem; User hierarchy; Hash function; Security; E-medicine;
D O I
暂无
中图分类号
学科分类号
摘要
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against ‘man-in-the-middle attack’ or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.’s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu–Chen’s scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu–Chen’s scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu–Chen’s scheme, Nikooghadam–Zakerolhosseini’s scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.
引用
收藏
相关论文
共 50 条
  • [31] Attacks on a secure group communication scheme with hierarchical access control
    Geiselmann, W
    Steinwandt, R
    [J]. 2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 14 - 14
  • [32] Key hierarchies for hierarchical access control in secure group communications
    Yan, Junzhi
    Ma, Jianfeng
    Liu, Hongyue
    [J]. COMPUTER NETWORKS, 2009, 53 (03) : 353 - 364
  • [33] Secure Authorization for Controlling Access via Key Management Scheme
    Hsiao, Tsung-Chih
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Xu, Fu-Sheng
    Tsui, Starlition
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [34] An Efficient Hierarchical Key Management Scheme for Access Medical Database
    Xie, Chang-Ying
    Lin, Guan-Li
    Lai, Yi-An
    Yeh, Jung
    Huang, Yu-Min
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    [J]. PROCEEDINGS OF THE 2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND ENGINEERING (IEEE-ICICE 2017), 2017, : 461 - 463
  • [35] A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication
    Hui Qi
    Peipei Li
    Chunbo Wang
    Jinlei Du
    Xiaoqiang Di
    [J]. Mobile Networks and Applications, 2023, 28 : 473 - 485
  • [36] A secure hierarchical key management scheme in mobile ad hoc networks
    Shi, Rong-Hua
    Yuan, Qian
    [J]. Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2010, 41 (01): : 201 - 206
  • [37] A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication
    Qi, Hui
    Li, Peipei
    Wang, Chunbo
    Du, Jinlei
    Di, Xiaoqiang
    [J]. MOBILE NETWORKS & APPLICATIONS, 2023, 28 (02): : 473 - 485
  • [38] KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services
    Gu, Qijun
    Liu, Peng
    Lee, Wang-Chien
    Chu, Chao-Hsien
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (03) : 188 - 201
  • [39] A secure and efficient time-bound hierarchical access control scheme for secure broadcasting
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    [J]. International Journal of Ad Hoc and Ubiquitous Computing, 2016, 22 (04) : 236 - 248
  • [40] Secure Access Control Scheme of RFID System Application
    Huang, Yu-Chih
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 525 - 528