An enhanced traceable access control scheme based on multi-authority CP-ABE for cloud-assisted e-health system

被引:0
|
作者
Liu, Xiao [1 ]
Wei, Zhenyang [1 ]
Li, Gaoxiang [1 ]
Chen, Jining [2 ]
机构
[1] Guangxi Univ, Coll Comp & Elect Informat, Nanning 530000, Peoples R China
[2] Guangxi Zhuang Autonomous Reg Informat Ctr, Guangxi Key Lab Digital Infrastruct, Nanning 530200, Peoples R China
基金
中国国家自然科学基金;
关键词
Black box traceable; White box traceable; Ciphertext policy attribute-based encryption; Cloud service provider; E -health system;
D O I
10.1016/j.comnet.2024.110766
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the inherent openness of the Internet of Things (IoT), e-health systems that utilize this technology on a broad scale are susceptible to network attacks. The propose black and white box traceable multi-authority ciphertext policy attribute-based encryption scheme (BWMABE) that combines black and white box accountability with ciphertext policy attribute-based encryption (CP-ABE) to improve data security in e-health systems. The proposed BWMABE scheme enhances security by enabling traceable permissions leakage and employs distributed attribute and key management across multiple authorities. By outsourcing the decryption process to cloud service providers, the proposed BWMABE significantly reduces the computational burden on end-users, making it suitable for lightweight IoT devices with limited computing power. Compared to previous traceable CP-ABE methods, the proposed BWMABE requires less computational effort while supporting both black box and white box traceability. By means of thorough security analysis and performance assessment, the proposed BWMABE has been validated to provide robust security and high efficiency, demonstrating its effectiveness in protecting e-health systems.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Black-Box Accountable Authority CP-ABE Scheme for Cloud-Assisted E-Health System
    Liu, Zhenhua
    Ding, Yingying
    Yuan, Ming
    Wang, Baocang
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 756 - 767
  • [2] Fine-grained access control of files stored in cloud storage with traceable and revocable multi-authority CP-ABE scheme
    Mishra, Bharati
    Jena, Debasish
    Patnaik, Srikanta
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (04) : 320 - 338
  • [3] Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation
    Sethi, Kamalakanta
    Pradhan, Ankit
    Bera, Padmalochan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [4] Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN
    Wu, Zhijun
    Zhang, Yun
    Xu, Enzhong
    FUTURE INTERNET, 2020, 12 (01):
  • [5] A Multi-authority CP-ABE Scheme based on Cloud-Chain Fusion for SWIM
    Wang, Qing
    Zhang, Lizhe
    Lu, Xin
    Wang, Kenian
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 213 - 219
  • [6] Multi-Authority Scheme based CP-ABE with Attribute Revocation for Cloud Data Storage
    Ramesh, Dharavath
    Priya, Rashmi
    2016 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMPUTING AND COMMUNICATIONS (MICROCOM), 2016,
  • [7] Research on Multi-Authority CP-ABE Access Control Model in Multicloud
    Shengli Zhou
    Guangxuan Chen
    Guangjie Huang
    Jin Shi
    Ting Kong
    中国通信, 2020, 17 (08) : 220 - 233
  • [8] Research on Multi-Authority CP-ABE Access Control Model in Multicloud
    Zhou, Shengli
    Chen, Guangxuan
    Huang, Guangjie
    Shi, Jin
    Kong, Ting
    CHINA COMMUNICATIONS, 2020, 17 (08) : 220 - 233
  • [9] A decentralized multi-authority CP-ABE scheme from LWE
    Yao, Yun-Fei
    Chen, Hui-Yan
    Gao, You
    Wang, Ke
    Yu, Hao-Yang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 82
  • [10] Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing
    Yang, Yang
    Sun, Jianguo
    Liu, Zechao
    Qiao, YuQing
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65