Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare

被引:6
作者
Choksy, Pooja [1 ]
Chaurasia, Akhil [1 ]
Rao, Udai Pratap [2 ]
Kumar, Sonu [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Comp Sci & Engn Dept, Surat 395007, Gujarat, India
[2] Natl Inst Technol, Comp Sci & Engn Dept, Patna 800005, Bihar, India
关键词
Attribute based access control; Flexible delegation; Partial delegation; Permission delegation; Healthcare; Internet of things; INTERNET; ENCRYPTION; THINGS;
D O I
10.1007/s12083-023-01486-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the meteoric rise of cloud computing and the Internet of Things (IoT) concepts, remote monitoring of patients in real-time has become possible, and patients can now get healthcare services at home. To accomplish this, the patient's medical records must be stored on a server on the cloud. However, patient medical records kept on a server are extremely sensitive, making the Cloud-enabled IoT (CE-IoT) network vulnerable to several threats. Therefore, it must ensure that patient's medical records are not exposed to malicious users. Therefore, advanced fine-grained access control systems are required to protect data for authorized users. To realize the full potential of IoT healthcare, flexible access control schemes are a current field of research. We propose the Attribute-Based Access Control (ABAC) model with completely flexible and programmable delegation capabilities to satisfy the aforementioned requirements. In our addressed delegation model, a delegator may delegate fully or partially, depending on the situation. The delegator can delegate read, write, and edit permissions for a given resource. Our proposed scheme manages this permission delegation further by the Quality Factor (QF) of authorized users. The proposed scheme can provide multi-level access delegation by restricting the number of further delegations of a particular attribute. Each delegator can manage further delegations by delegatee to compensate for suitable user behaviors. Thus, a user can gain access to cloud-based healthcare data by presenting evidence that they hold the relevant attribute set (attributes may be assigned or delegated) according to the access policies. The proposed scheme also includes a mechanism for attribute revocation on demand. Theoretical and practical analyses demonstrate that the proposed scheme is computationally efficient, safe against attribute collusion, impersonation attacks, and replay attacks, and meets its stated goals. We have demonstrated that the proposed access control scheme has greater delegation capabilities than the existing ABAC scheme with access delegation capabilities.
引用
收藏
页码:1445 / 1467
页数:23
相关论文
共 34 条
[1]   Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :47-57
[2]   A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage [J].
Ahuja, Rohit ;
Mohanty, Sraban Kumar .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) :32-44
[3]   Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things [J].
Ali, Mohammad ;
Sadeghi, Mohammad-Reza ;
Liu, Ximeng .
IEEE ACCESS, 2020, 8 :23951-23964
[4]  
Azizan Azizul, 2022, 2022 4th International Conference on Smart Sensors and Application (ICSSA), P150, DOI 10.1109/ICSSA54161.2022.9870939
[5]   A Secure and Flexible Method of Permission Delegation Between Different Account Types [J].
Badirova, Aytaj ;
Dabbaghi, Shirin ;
Moghaddam, Faraz Fatemi ;
Wieder, Philipp ;
Yahyapour, Ramin .
2021 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD, FICLOUD 2021, 2021, :50-57
[6]   An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions [J].
Bang, Ankur O. ;
Rao, Udai Pratap ;
Visconti, Andrea ;
Brighente, Alessandro ;
Conti, Mauro .
COMPUTERS & SECURITY, 2022, 123
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]  
Bilgen MB, 2020, 2020 INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCTURKEY 2020), P48, DOI [10.1109/iscturkey51113.2020.9307964, 10.1109/ISCTURKEY51113.2020.9307964]
[9]  
Darshan KR, 2015, 2015 INTERNATIONAL CONFERENCE ON EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY (ICERECT), P132, DOI 10.1109/ERECT.2015.7499001
[10]  
Green, 2012, RETRIEVED MAY, V12, P2014