Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system

被引:0
作者
Chanchal Maurya
Vijay Kumar Chaurasiya
机构
[1] Indian Institute of Information Technology Allahabad,
来源
Multimedia Tools and Applications | 2023年 / 82卷
关键词
IoT; Proxy re-encryption; Blockchain; Mutual authentication; E-healthcare system;
D O I
暂无
中图分类号
学科分类号
摘要
E-healthcare system has been introduced to provide real-time patient health monitoring using IoT sensors and efficiently share patient data with multiple users. Patients need to outsource their health data over the cloud due to the resource-constrained nature of IoT devices and patient devices. While accessing the data from a trusted cloud or distributed users makes health data susceptible and leads to leakage and manipulation. Therefore, we need secure data sharing with fine-grained access control and authentication schemes. The existing proxy re-encryption data sharing schemes use the same key to re-encrypt the patient’s health data more than once, leading to a collusion attack with users. This paper proposes an efficient and collusion-resistant re-encryption scheme (CRRE) with mutual authentication to address the collusion attack that provides privacy-preserving secure data sharing with fine-grained access control. Integrating the CRRE scheme with blockchain provides data integrity, verifiability, accountability, and interoperability between all entities in the e-healthcare system. The random oracle model and AVISPA tool are used to validate the formal and informal security of the CRRE scheme. The proposed scheme is implemented and compared with existing PRE-based schemes on various parameters. The results prove that the proposed CRRE scheme is more efficient and suitable for resource-constrained devices in the e-healthcare system.
引用
收藏
页码:40443 / 40472
页数:29
相关论文
共 166 条
[11]  
Hancke GP(2021)Secure and energy efficient-based E-health care framework for green internet of things IEEE Trans Green Commun Netw 5 1223-12
[12]  
Abu-Mahfouz AM(2018)Secure attribute-based data sharing for resource-limited users in cloud computing Comput Secur 72 1-108
[13]  
Ali M(2018)Blockchain-based data preservation system for medical data J Med Syst 42 141-131
[14]  
Sadeghi M-R(2015)A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing Futur Gener Comput Syst 52 95-21
[15]  
Liu X(2019)A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system J Inf Secur Appl 47 125-71
[16]  
Ara A(2020)poEWAL: a lightweight consensus mechanism for blockchain in IoT Pervasive Mob Comput 69 101291-3329
[17]  
Al-Rodhaan M(2022)Raising consent awareness with gamification and knowledge graphs: an automotive use case Int J Semant Web Inf Syst (IJSWIS) 18 1-4196
[18]  
Tian Y(2021)Using clustering for forensics analysis on internet of things Int J Softw Sci Comput Intell (IJSSCI) 13 56-547
[19]  
Al-Dhelaan A(2020)Energy-aware green adversary model for cyber physical security in industrial system IEEE Trans Ind Inform 16 3322-184
[20]  
Cao H(2019)Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics IEEE Trans Ind Inform 15 4189-34