Efficient User-Centric Privacy-Friendly and Flexible Wearable Data Aggregation and Sharing

被引:2
作者
Jastaniah, Khlood [1 ]
Zhang, Ning [1 ]
Mustafa, Mustafa A. [1 ,2 ,3 ]
机构
[1] Univ Manchester, Dept Comp Sci, Manchester M13 9PL, England
[2] Univ Jeddah, Coll Comp Sci & Engn, Jeddah 23218, Saudi Arabia
[3] Katholieke Univ Leuven, COSIC, B-3000 Leuven, Belgium
基金
英国工程与自然科学研究理事会;
关键词
Access control; attribute-based encryption; multi-key homomorphic encryption; privacy; wearables; ENCRYPTED DATA; SCHEME;
D O I
10.1109/TCC.2024.3375801
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wearable devices can offer services to individuals and the public. However, wearable data collected by cloud providers may pose privacy risks. To reduce these risks while maintaining full functionality, healthcare systems require solutions for privacy-friendly data processing and sharing that can accommodate three main use cases: (i) data owners requesting processing of their own data, and multiple data requesters requesting data processing of (ii) a single or (iii) multiple data owners. Existing work lacks data owner access control and does not efficiently support these cases, making them unsuitable for wearable devices. To address these limitations, we propose a novel, efficient, user-centric, privacy-friendly, and flexible data aggregation and sharing scheme, named SAMA. SAMA uses a multi-key partial homomorphic encryption scheme to allow flexibility in accommodating the aggregation of data originating from a single or multiple data owners while preserving privacy during the processing. It also uses ciphertext-policy attribute-based encryption scheme to support fine-grain sharing with multiple data requesters based on user-centric access control. Formal security analysis shows that SAMA supports data confidentiality and authorisation. SAMA has also been analysed in terms of computational and communication overheads. Our experimental results demonstrate that SAMA supports privacy-preserving flexible data aggregation more efficiently than the relevant state-of-the-art solutions.
引用
收藏
页码:967 / 982
页数:16
相关论文
共 44 条
[1]  
Act A, 1996, Health Insurance Portability and Accountability Act of 1996 (HIPAA) | Public Health Law | CDC, V104, P191
[2]   Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey [J].
Aloufi, Asma ;
Hu, Peizhao ;
Song, Yongsoo ;
Lauter, Kristin .
ACM COMPUTING SURVEYS, 2022, 54 (09)
[3]   Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption [J].
Aloufi, Asma ;
Hu, Peizhao ;
Wong, Harry W. H. ;
Chow, Sherman S. M. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) :1821-1835
[4]  
Alshehri S., 2012, Proceedings of the 2012 IEEE International Conference on Data Engineering Workshops (ICDEW 2012), P143, DOI 10.1109/ICDEW.2012.68
[5]  
[Anonymous], 2016, Regulation (EU) 2016 General Data Protection Regulation
[6]   A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems [J].
Ara, Anees, Jr. ;
Al-Rodhaan, Mznah ;
Tian, Yuan ;
Al-Dhelaan, Abdullah .
IEEE ACCESS, 2017, 5 :12601-12617
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]   EEPPDA-Edge-enabled efficient privacy-preserving data aggregation in smart healthcare Internet of Things network [J].
Bhowmik, Tanima ;
Banerjee, Indrajit .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2023, 33 (01)
[9]  
Chen J., 2021, P INT C SEC PRIV NEW, P192
[10]  
Chen S., 2022, PROC 5 INT C ALGORIT, P1