Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things

被引:3
作者
Libing Wu
Yubo Zhang
Mimi Ma
Neeraj Kumar
Debiao He
机构
[1] Wuhan University,Computer School
[2] Wuhan University,School of Mathematics and Statistics
[3] Thapar University,Department of Computer Science and Engineering
[4] Wuhan University,School of Cyber Science and Engineering
来源
Annals of Telecommunications | 2019年 / 74卷
关键词
Certificateless; Cloud-assisted; Medical internet of things; Privacy; Security;
D O I
暂无
中图分类号
学科分类号
摘要
In the past few years, internet of things has been explored in medical area to achieve high efficiency and accuracy in the medical treatment and management. One of the most powerful technologies called the medical Internet of Things (mIoT), is underpinned by the considerable computational ability of cloud and the efficient data collection of medical sensors. As the data is transmitted over open network, security remains a paramount concern in mIoT. Encryption techniques may help to protect patient privacy, but they limit the future retrieval of the encrypted data. To uplift this limitation, public key encryption with keyword search (PEKS) has been introduced. However, most of the existing PEKS schemes are based on public key infrastructure or identity-based cryptography, which suffers from the certificate management issue and key escrow problem in system deployment, respectively. Moreover, inside keyword guessing attack seems to become a severe issue to violate privacy in data search. To address these issues, we present a certificateless searchable public key authenticated encryption scheme with designated tester (CL-dPAEKS), which, we believe, is suitable for cloud-assisted mIoT. We prove that our scheme can resist various types of attacks, and it is more secure than other schemes that built on certificateless cryptography, without significant loss in efficiency.
引用
收藏
页码:423 / 434
页数:11
相关论文
共 121 条
[1]  
Hossain M(2016)Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring Comput Net 101 192-202
[2]  
Muhammad G(2016)Medical internet of things and big data in healthcare Healthcare Informatics Research 22 156-163
[3]  
Dimitrov DV(2018)Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT IEEE Access 6 20085-20103
[4]  
Jhaveri RH(2010)The internet of things: a survey Comput Net 54 2787-2805
[5]  
Patel NM(2015)Enabling the internet of things Computer 48 28-35
[6]  
Zhong Y(2014)Securely outsourcing attribute-based encryption with checkability IEEE Trans Parallel Distrib. Syst 25 2201-2210
[7]  
Sangaiah AK(2017)Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing Inf Sci 379 42-61
[8]  
Atzori L(2016)Privacy-preserving face recognition with outsourced computation Soft Comput 20 3735-3744
[9]  
Iera A(2016)Handling big data: research challenges and future directions J Supercomput 72 1494-1516
[10]  
Morabito G(2016)Cloud-based electronic health record system supporting fuzzy keyword search Soft Comput 20 3243-3255