Developing a Secure Architecture for Internet of Medical Things Using Attribute-Based Encryption

被引:1
|
作者
Ghanbarafjeh, Milad [1 ]
Barati, Masoud [1 ]
Rana, Omer [2 ]
Ranjan, Rajiv [1 ]
机构
[1] Newcastle Univ, Sch Comp, Newcastle Upon Tyne, Tyne & Wear, England
[2] Cardiff Univ, Sch Comp Sci & Informat, Cardiff, S Glam, Wales
关键词
IoMT; Ciphertext Policy Attribute-Based Encryption; Data Security; Cryptography; CHALLENGES; EFFICIENT; PRIVACY;
D O I
10.1109/UCC56403.2022.00028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Medical Things (IoMT) is a new paradigm in the IoT-based healthcare and medical applications which has brought many advantages to this. Increasing in the number of smart medical devices has led to security challenges within IoMT environments. Cryptography and other cutting-edge approaches have been widely used to mitigate the challenges and prevent sensitive data leakage. One of such approaches is the attribute-based encryption (ABE), which enables a fine-grained and flexible access control. However, the ABE does not provide a dynamic encryption mechanism when patients' conditions change over the period of remote monitoring. To address this, we present a novel security architecture for IoMT that relies on ciphertext policy attribute-based encryption (CP-ABE). The architecture applies a dynamic access structure for the encryption in accordance with the status of the medical data collected by IoMT devices. We define some new components mainly hosted on the IoMT gateways in order to encrypt and decrypt the medical data in the architecture. An IoMT use case is presented to show how our proposed architecture supports dynamic encryption in e-healthcare systems.
引用
收藏
页码:157 / 162
页数:6
相关论文
共 50 条
  • [31] Multi-Authorization Center Attribute-Based Encryption Scheme Based on Internet of Things
    Hao, Xuan
    Li, Da
    Huang, Zhangqin
    Yang, Huapeng
    2024 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS, ICCCS 2024, 2024, : 254 - 259
  • [32] Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    Zhang Miao
    CHINA COMMUNICATIONS, 2012, 9 (09) : 22 - 40
  • [33] Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future
    Bhatt, Smriti
    Pham, Thanh Kim
    Gupta, Maanak
    Benson, James
    Park, Jaehong
    Sandhu, Ravi
    IEEE ACCESS, 2021, 9 : 107200 - 107223
  • [34] Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things
    Zeng, Peng
    Zhang, Zhiting
    Lu, Rongxing
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10963 - 10972
  • [35] Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    INTERNET OF THINGS, 2023, 23
  • [36] Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things
    Yan, Xixi
    He, Guanghui
    Yu, Jinxia
    Tang, Yongli
    Zhao, Mingjie
    JOURNAL OF SENSORS, 2020, 2020
  • [37] Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things
    Han, Qi
    Zhang, Yinghui
    Li, Hui
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 83 : 269 - 277
  • [38] Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme
    Shruti
    Rani, Shalli
    Srivastava, Gautam
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 235
  • [39] An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things
    Li, Hang
    Yu, Keping
    Liu, Bin
    Feng, Chaosheng
    Qin, Zhiguang
    Srivastava, Gautam
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 1949 - 1960
  • [40] Designing quantum-secure attribute-based encryption
    Rao, Y. Sreenivasa
    Srivastava, Vikas
    Mohanty, Tapaswini
    Debnath, Sumit Kumar
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09): : 13075 - 13091