Fog-Enabled Secure and Efficient Fine-Grained Searchable Data Sharing and Management Scheme for IoT-Based Healthcare Systems

被引:18
作者
Mamta [1 ]
Gupta, Brij B. [2 ,3 ,4 ,5 ]
Lytras, Miltiadis D. [4 ,6 ]
机构
[1] Thapar Inst Engn & Technol, Comp Sci & Engn Dept, Patiala 147004, Punjab, India
[2] Natl Inst Technol, Dept Comp Engn, Kurukshetra 136119, Haryana, India
[3] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[4] King Abdulaziz Univ, Jeddah 21589, Saudi Arabia
[5] Staffordshire Univ, Stoke On Trent ST4 2DE, Staffs, England
[6] Amer Coll Greece, Athens 20006, Greece
关键词
Medical services; Encryption; Security; Cloud computing; Task analysis; Computational efficiency; Edge computing; Fine-grained searchable encryption; fog compu-ting; Internet-of-Things (IoT); resource-constrained devices; smart healthcare; PUBLIC-KEY ENCRYPTION; KEYWORD SEARCH; PROTOCOL;
D O I
10.1109/TEM.2022.3143661
中图分类号
F [经济];
学科分类号
02 ;
摘要
In recent times, fog computing has emerged as a helpful extension of cloud computing. It can efficiently handle the prevalent issue of managing silos of data generated by today's digital healthcare services. Moreover, the application of the Internet of Things (IoT) in the development of smart healthcare systems further adds tons of data tirelessly to these silos, thus making the cloud congested. To manage such continuously growing data, the concept of adding a fog layer between the cloud and the end-users (EUs) proved to be beneficial. These intermediary fog nodes (FNs) can handle and store data, and thus facilitate the cloud and alleviate the burden from the EUs. Most of the existing search schemes for encrypted data have been developed for the cloud platform and ignored this helpful extension, which can improve the scheme's efficiency by delegating most of the heavy computations to the intermediary FNs. In this article, a fine-grained searchable data sharing scheme has been proposed using the fog computing platform. The resulting scheme is efficient and lightweight because the FN facilitates EUs by performing computationally intensive tasks on their behalf. A significant reduction in storage and computational cost has been achieved by the proposed scheme at the data owner's end, representing the resource-constrained IoT devices. The storage cost has been reduced to two source group elements, and the computational cost has been reduced to three exponent operations in the source group and one hash operation. Furthermore, the proposed scheme is secure against the selectively chosen keyword attack in the generic bilinear group model.
引用
收藏
页码:12566 / 12578
页数:13
相关论文
共 38 条
[1]  
[Anonymous], 2021, HEALTHCARE CYBERSECU
[2]  
[Anonymous], 2021, Internet of Things (IoT) in healthcare market
[3]   Security by Design for Big Data Frameworks Over Cloud Computing [J].
Awaysheh, Feras M. ;
Aladwan, Mohammad N. ;
Alazab, Mamoun ;
Alawadi, Sadi ;
Cabaleiro, Jose C. ;
Pena, Tomas F. .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2022, 69 (06) :3676-3693
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]   A forward-secure public-key encryption scheme [J].
Canetti, Ran ;
Halevi, Shai ;
Katz, Jonathan .
JOURNAL OF CRYPTOLOGY, 2007, 20 (03) :265-294
[7]  
Ceccarelli A, 2020, IEEE T 1120 ENG MANA, DOI DOI 10.1109/TEM.2020.3024105.1121
[8]   Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control [J].
Chen, Zehong ;
Zhang, Fangguo ;
Zhang, Peng ;
Liu, Joseph K. ;
Huang, Jiwu ;
Zhao, Hanbang ;
Shen, Jian .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 :712-724
[9]   OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud [J].
Cui, Jie ;
Zhou, Han ;
Xu, Yan ;
Zhong, Hong .
INFORMATION SCIENCES, 2019, 489 :63-77
[10]  
De Caro A, 2011, IEEE SYMP COMP COMMU