Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things

被引:55
|
作者
Zhang, Yinghui [1 ,2 ,3 ,4 ]
Deng, Robert H. [3 ]
Han, Gang [5 ]
Zheng, Dong [1 ,4 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
[4] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
[5] Northwestern Polytech Univ, Sch Elect & Informat, Xian 710129, Shaanxi, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Smart health; Security; Privacy; Aggregate authentication; Access control; ATTRIBUTE-BASED ENCRYPTION; CLOUD STORAGE; EFFICIENT; SIGNATURE; SCHEME; ACCOUNTABILITY; NETWORKS;
D O I
10.1016/j.jnca.2018.09.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid technological advancements in the Internet of Things (IoT), wireless communication and cloud computing, smart health is expected to enable comprehensive and qualified healthcare services. It is important to ensure security and efficiency in smart health. However, existing smart health systems still have challenging issues, such as aggregate authentication, fine-grained access control and privacy protection. In this paper, we address these issues by introducing SSH, a Secure Smart Health system with privacy-aware aggregate authentication and access control in IoT. In SSH, privacy-aware aggregate authentication is enabled by an anonymous certificateless aggregate signature scheme, in which users' identity information is protected based on symmetric encryption mechanisms. In addition, privacy-aware access control is based on anonymous attribute-based encryption technologies. Our formal security proofs indicate that SSH achieves batch authentication and non-repudiation under the Computational Diffie-Hellman assumption. Extensive experimental results and performance comparisons show that SSH is practical in terms of computation cost and communication overheads.
引用
收藏
页码:89 / 100
页数:12
相关论文
共 50 条
  • [1] Privacy-Aware Authentication in the Internet of Things
    Gross, Hannes
    Hoelbl, Marko
    Slamanig, Daniel
    Spreitzer, Raphael
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 32 - 39
  • [2] ARMY: ARCHITECTURE FOR A SECURE AND PRIVACY-AWARE LIFECYCLE OF SMART OBJECTS IN THE INTERNET OF MY THINGS
    Hernandez-Ramos, Jose L.
    Bernal Bernabe, Jorge
    Skarmeta, Antonio
    IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (09) : 28 - +
  • [3] A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things
    Jia, Xiaoying
    Luo, Min
    Wang, Huaqun
    Shen, Jian
    He, Debiao
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (21) : 21838 - 21850
  • [4] Designing privacy-aware internet of things applications
    Perera, Charith
    Barhamgi, Mahmoud
    Bandara, Arosha K.
    Ajmal, Muhammad
    Price, Blaine
    Nuseibeh, Bashar
    INFORMATION SCIENCES, 2020, 512 : 238 - 257
  • [5] Privacy-aware resource management solutions in Internet of Things
    Souri, Alireza
    Kumari, Saru
    Elhoseny, Mohamed
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (08)
  • [6] A privacy-aware access control system
    Ardagna, C.
    Cremonini, M.
    di Vimercati, S.
    Samarati, P.
    JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) : 369 - 397
  • [7] A privacy-aware continuous authentication scheme for proximity-based access control
    Agudo, Isaac
    Rios, Ruben
    Lopez, Javier
    COMPUTERS & SECURITY, 2013, 39 : 117 - 126
  • [8] A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience
    Zhang, Yinghui
    Lang, Pengzhen
    Zheng, Dong
    Yang, Menglei
    Guo, Rui
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [9] A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions
    Fan, Chun-, I
    Karati, Arijit
    Wu, Shou-Li
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2766 - 2778
  • [10] Privacy-aware smart card based biometric authentication scheme for e-health
    Chen, Li
    Zhang, Ke
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1353 - 1365