Fine-grained multi-authority access control in IoT-enabled mHealth

被引:25
作者
Li, Qi [1 ]
Zhu, Hongbo [2 ]
Xiong, Jinbo [3 ]
Mo, Ruo [4 ]
Ying, Zuobin [5 ]
Wang, Huaqun [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Jiangsu Innovat Coordinat Ctr Internet Things, Nanjing 210003, Jiangsu, Peoples R China
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Fujian, Peoples R China
[4] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[5] Anhui Univ, Sch Comp Sci & Technol, Hefei 230601, Anhui, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Mobile healthcare; Attribute-based encryption; Access control; Multiple authorities; Efficient decryption; ATTRIBUTE-BASED ENCRYPTION; PRIVACY; SECURE; SCHEME; CONVERTER; EFFICIENT;
D O I
10.1007/s12243-018-00702-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the popularity of Internet of Things (IoT) and cloud computing technologies, mobile healthcare (mHealth) can offer remote, accurate, and effective medical services for patients according to their personal health records (PHRs). However, data security and efficient access of the PHR should be addressed. Attribute-based encryption (ABE) is regarded as a well-received cryptographic mechanism to simultaneously realize fine-grained access control and data confidentiality in mHealth. Nevertheless, existing works are either constructed in the single-authority setting which may be a performance bottleneck, or lack of efficient user decryption. In this paper, we propose SEMAAC, a secure and efficient multi-authority access control system for IoT-enabled mHealth. In SEMAAC, there are multiple independently worked attribute authorities (AAs). A new entity could be an AA without re-building the system. To reduce the user decryption overhead, most decryption is executed in cloud server, which whereafter returns a partial decryption ciphertext (PDC). The AAs can help the user to check if the PDC is correctly computed. Additionally, a restricted user can delegate his/her key to someone to outsource the decryption and check the returned result, without exposing the plaintext PHR file. The proposed SEMAAC is proved to be adaptively secure in the standard model. The numerical analysis and extensive experiments illustrate the efficiency and advantage of our scheme.
引用
收藏
页码:389 / 400
页数:12
相关论文
共 45 条
  • [1] Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications
    Al-Janabi, Samaher
    Al-Shourbaji, Ibrahim
    Shojafar, Mohammad
    Shamshirband, Shahaboddin
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2017, 18 (02) : 113 - 122
  • [2] [Anonymous], MOB INF SYST
  • [3] [Anonymous], 2017, MAINTENANCE HDB, DOI DOI 10.1201/9781420036855-12
  • [4] [Anonymous], 1996, SECURE SCHEMES SECRE
  • [5] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [6] Bi YD, 2018, INT CONF ASIAN LANG, P8, DOI 10.1109/IALP.2018.8629186
  • [7] Brown L, 2011, COLLOQUY, P34
  • [8] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
  • [9] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
  • [10] De Caro A, 2011, IEEE SYMP COMP COMMU