Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks

被引:27
作者
Zhou, Yuyang [1 ]
Zhao, Liang [2 ]
Jin, Yuqiao [3 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
[3] Second Res Inst CAAC, Chengdu 610041, Peoples R China
基金
中国国家自然科学基金;
关键词
Identity-based proxy re-encryption; Wireless body area networks; Cryptographic reverse firewall; Exfiltration-resistant; ACCESS-CONTROL; SCHEME;
D O I
10.1016/j.ins.2022.05.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wireless body area network (WBAN) provides users with real-time medical services. Meanwhile, the cloud technology provides greater storage space and computing power for medical data. Both of them have contribute to the development of telemedicine. In a cloud-assisted WBAN, the open network environment and the semi-trust cloud service providers expose the user's private medical data to backdoor adversaries who can make exfiltration attacks, such as the algorithm substitution attack (ASA) through the process of data sharing. Therefore, it is necessary to find a secure and efficient medical data sharing scheme for the huge amount of medical data. In this paper, we first design an identity based proxy re-encryption scheme with cryptographic reverse firewall (IBPRE-CRF), then show the application in a multiple-access telemedicine data sharing scenario. Security analysis shows that the IBPRE-CRF scheme provides chosen plaintext attack security and resists exfiltration attacks. Performance analysis shows that the IBPRE-CRF scheme has a significant communication and computational cost advantage while being resistant to exfiltration attacks in clouds. Therefore, our IBPRE-CRF scheme is suitable for telemedicine data sharing in a cloud-assisted WBAN. (c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:80 / 96
页数:17
相关论文
共 47 条
[1]   A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain [J].
Agyekum, Kwame Opuni-Boachie Obour ;
Xia, Qi ;
Sifah, Emmanuel Boateng ;
Cobblah, Christian Nii Aflah ;
Xia, Hu ;
Gao, Jianbin .
IEEE SYSTEMS JOURNAL, 2022, 16 (01) :1685-1696
[2]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]  
Barker E., 2007, RECOMMENDATION KEY M, P1
[4]  
Barker W.C., 2012, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher: NIST Special Publication 800-67, Revision 2
[5]  
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[6]  
Bellare M, 2014, LECT NOTES COMPUT SC, V8616, P1, DOI 10.1007/978-3-662-44371-2_1
[7]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]   Anonymous Attestation with Subverted TPMs [J].
Camenisch, Jan ;
Drijvers, Manu ;
Lehmann, Anja .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 :427-461
[10]  
Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185