Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

被引:380
作者
Zhang, Yinghui [1 ,2 ,3 ]
Zheng, Dong [1 ]
Deng, Robert H. [3 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
基金
中国国家自然科学基金;
关键词
Attribute-based encryption (ABE); decryption test; full security; large universe; privacy protection; smart health (s-health); DUAL SYSTEM ENCRYPTION; INTERNET; THINGS; NETWORKS; HIBE; IOT;
D O I
10.1109/JIOT.2018.2825289
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Internet of Things and cloud computing technologies, smart health (s-health) is expected to significantly improve the quality of health care. However, data security and user privacy concerns in s-health have not been adequately addressed. As a well-received solution to realize fine-grained access control, ciphertext-policy attributebased encryption (CP-ABE) has the potential to ensure data security in s-health. Nevertheless, direct adoption of the traditional CP-ABE in s-health suffers two flaws. For one thing, access policies are in cleartext form and reveal sensitive health-related information in the encrypted s-health records (SHRs). For another, it usually supports small attribute universe, which places an undesirable limitation on practical deployments of CP-ABE because the size of its public parameters grows linearly with the size of the universe. To address these problems, we introduce PASH, a privacy-aware s-health access control system, in which the key ingredient is a large universe CP-ABE with access policies partially hidden. In PASH, attribute values of access policies are hidden in encrypted SHRs and only attribute names are revealed. In fact, attribute values carry much more sensitive information than generic attribute names. Particularly, PASH realizes an efficient SHR decryption test which needs a small number of bilinear pairings. The attribute universe can be exponentially large and the size of public parameters is small and constant. Our security analysis indicates that PASH is fully secure in the standard model. Performance comparisons and experimental results show that PASH is more efficient and expressive than previous schemes.
引用
收藏
页码:2130 / 2145
页数:16
相关论文
共 55 条
[1]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[2]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[3]  
[Anonymous], 2016, PROC 6 INT C COMMUN
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[6]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[7]   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage [J].
Chu, Cheng-Kang ;
Chow, Sherman S. M. ;
Tzeng, Wen-Guey ;
Zhou, Jianying ;
Deng, Robert H. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) :468-477
[8]   An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures [J].
Cui, Hui ;
Deng, Robert H. ;
Wu, Guowei ;
Lai, Junzuo .
PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 :19-38
[9]  
Datta SK, 2014, 2014 IEEE WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P514, DOI 10.1109/WF-IoT.2014.6803221
[10]  
De Caro A, 2011, IEEE SYMP COMP COMMU