Construction of system friendly attribute based fully distributed access control architecture for e-healthcare

被引:8
作者
Dharminder, Dharminder [1 ]
Dadsena, Pradeep Kumar [2 ]
Mishra, Dheerendra [3 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Comp, Dept Comp Sci & Engn, Chennai 601103, India
[2] Govt Engn Coll, Dept Math, Jagdalpur 494001, India
[3] Maulana Azad Natl Inst Technol, Dept Math Bioinformat & Comp Applicat, Bhopal 462003, India
基金
英国科研创新办公室;
关键词
Medical data storage; Bilinear pairing; Access control matrix; Data security; Data privacy; Attribute based access control; e-healthcare; ENCRYPTION; SECURE;
D O I
10.1007/s11042-023-14836-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The adoption of telemedicine has improved health care quality and its reachability to remote patients. There are substantial contributions towards the implementation of secure communication of medical records such as digital images, documents, videos, etc. However, less attention is paid to efficiency, privacy-preserving communication, and access control. Moreover, existing constructions have either failed to support distributed revocation or the symmetric encryption approach, which requires ensuring encryption of arbitrary length messages. As scalability and flexibility in the delegation of keys and revocation of mobile users are very fundamental issues in attribute-based access control and its application to e-healthcare, we propose a new cryptographic concept called attribute-based fully distributed access control architecture that supports fine-grained access control, data protection, data validity, and efficient data search in the context of an electronic personal health record system. The proposed design supports the symmetric key approach to encrypt/decrypt the data. The proposed design is secure and efficient, and it also provides a fully distributed access control on the stored data at a central authority with a revocation facility. It provides access to the user, doctor, and health department according to the set of attributes/ credentials shown by them. It benefits in key delegation and revocation of the user, which will help to improve the robustness of e-healthcare systems.
引用
收藏
页码:26937 / 26953
页数:17
相关论文
共 37 条
[1]   PAX: Using Pseudonymization and Anonymization to Protect Patients' Identities and Data in the Healthcare System [J].
Al-Zubaidie, Mishall ;
Zhang, Zhongwei ;
Zhang, Ji .
INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2019, 16 (09)
[2]   A fully distributed hierarchical attribute-based encryption scheme [J].
Ali, Mohammad ;
Mohajeri, Javad ;
Sadeghi, Mohammad-Reza ;
Liu, Ximeng .
THEORETICAL COMPUTER SCIENCE, 2020, 815 :25-46
[3]   An efficient privacy mechanism for electronic health records [J].
Anjum, Adeel ;
Malik, Saif Ur Rehman ;
Choo, Kim-Kwang Raymond ;
Khan, Abid ;
Haroon, Asma ;
Khan, Sangeen ;
Khan, Samee U. ;
Ahmad, Naveed ;
Raza, Basit .
COMPUTERS & SECURITY, 2018, 72 :196-211
[4]   Cloud computing in construction industry: Use cases, benefits and challenges [J].
Bello, Sururah A. ;
Oyedele, Lukumon O. ;
Akinade, Olugbenga O. ;
Bilal, Muhammad ;
Delgado, Juan Manuel Davila ;
Akanbi, Lukman A. ;
Ajayi, Anuoluwapo O. ;
Owolabi, Hakeem A. .
AUTOMATION IN CONSTRUCTION, 2021, 122
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]   Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future [J].
Bhatt, Smriti ;
Pham, Thanh Kim ;
Gupta, Maanak ;
Benson, James ;
Park, Jaehong ;
Sandhu, Ravi .
IEEE ACCESS, 2021, 9 :107200-107223
[7]  
Bobba R, 2009, LECT NOTES COMPUT SC, V5789, P587, DOI 10.1007/978-3-642-04444-1_36
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]   Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts [J].
Deng, Hua ;
Wu, Qianhong ;
Qin, Bo ;
Domingo-Ferrer, Josep ;
Zhang, Lei ;
Liu, Jianwei ;
Shi, Wenchang .
INFORMATION SCIENCES, 2014, 275 :370-384
[10]  
Gajanayake R., 2014, ELECT J HLTH INFORM, V8, pe151