Skip to main content
Erschienen in: The Journal of Supercomputing 7/2020

22.10.2018

An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud

verfasst von: Rui Guo, Xiong Li, Dong Zheng, Yinghui Zhang

Erschienen in: The Journal of Supercomputing | Ausgabe 7/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the personal health record (PHR) system, the patient’s health records are usually outsourced to a large database, such as the cloud service provider. In order to guarantee the confidentiality of this data , achieve access control with flexibility and fine-grained property, it usually employs ciphertext-policy attribute-based encryption (CP-ABE) scheme in cloud computing. However, the outsourced data have the characteristic of multi-level hierarchy, and the general CP-ABE is inappropriate for being applied in distributed cloud service systems directly to provide the security of hierarchy structure of outsourced data. In this paper, to overcome this challenge, a PHR hierarch CP-ABE scheme with multiple authorities is presented. This protocol integrated some different access structures into a single one, which the hierarchical PHR is encrypted based on. There are multiple authorities to generate and distribute user’s private key all together. According to this mode, it enables to avoid the problem of key escrow and conform to the distributed characteristic of cloud service systems. However, it has no trusted single or central one in these authorities. Moreover, this proposed scheme resists \((N-1)\) corrupted authorities out of N authorities in the collusion attack. Based on the intractability of the standard decisional bilinear Diffie–Hellman problem, the security of this protocol is proven to be semantic secure. Finally, by comparison analysis, this protocol exhibits a better performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: IEEE symposium on security and privacy—SP2007. IEEE, Berkeley, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: IEEE symposium on security and privacy—SP2007. IEEE, Berkeley, pp 321–334
2.
Zurück zum Zitat Chase M (2007) Multi-authority attribute based encryption. In: Proceedings of the 4th theory of cryptography conference—TCC2007. Springer, Amsterdam, pp 515–534 Chase M (2007) Multi-authority attribute based encryption. In: Proceedings of the 4th theory of cryptography conference—TCC2007. Springer, Amsterdam, pp 515–534
3.
Zurück zum Zitat Chase M, Chow SS (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM computer and communications security—CCS2009. ACM, Chicago, pp 121–130 Chase M, Chow SS (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM computer and communications security—CCS2009. ACM, Chicago, pp 121–130
4.
Zurück zum Zitat Chu CK, Zhu WT, Han J, Liu JK, Xu J, Zhou J (2013) Security concerns in popular cloud storage services. IEEE Pervasive Comput 12:50–57CrossRef Chu CK, Zhu WT, Han J, Liu JK, Xu J, Zhou J (2013) Security concerns in popular cloud storage services. IEEE Pervasive Comput 12:50–57CrossRef
5.
Zurück zum Zitat Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370–384MathSciNetCrossRef Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370–384MathSciNetCrossRef
6.
Zurück zum Zitat Fan CI, Huang VSM, Ruan HM (2014) Arbitrary-state attribute-based encryption with dynamic membership. IEEE Trans Comput 63:1951–1961MathSciNetCrossRef Fan CI, Huang VSM, Ruan HM (2014) Arbitrary-state attribute-based encryption with dynamic membership. IEEE Trans Comput 63:1951–1961MathSciNetCrossRef
7.
Zurück zum Zitat Gentry C, Silverberg A (2002) Hierarchical ID-based cryptography. In: Zheng Y (ed) Advances in cryptology—ASIACRYPT2011, vol 2501. Springer, Queenstown, pp 548–566 Gentry C, Silverberg A (2002) Hierarchical ID-based cryptography. In: Zheng Y (ed) Advances in cryptology—ASIACRYPT2011, vol 2501. Springer, Queenstown, pp 548–566
9.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM computer and communications security—CCS2006. ACM, Virginia, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM computer and communications security—CCS2006. ACM, Virginia, pp 89–98
10.
Zurück zum Zitat Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of abe ciphertext. In: Proceedings of the 20th USENIX Security symposium, vol 49. USENIX Association Press, San Francisco, pp 1–16 Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of abe ciphertext. In: Proceedings of the 20th USENIX Security symposium, vol 49. USENIX Association Press, San Francisco, pp 1–16
11.
Zurück zum Zitat He D, Kumar N, Wang H, Wang L, Choo KKR, Vinel A (2018) A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans Depend Secure Comput 15:633–645CrossRef He D, Kumar N, Wang H, Wang L, Choo KKR, Vinel A (2018) A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans Depend Secure Comput 15:633–645CrossRef
12.
Zurück zum Zitat He D, Zeadally S, Wu L (2018) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J 12:64–73 He D, Zeadally S, Wu L (2018) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J 12:64–73
13.
Zurück zum Zitat Hu VC, Kuhn DR, Ferraiolo DF (2015) Attribute-based access control. Computer 48:85–88CrossRef Hu VC, Kuhn DR, Ferraiolo DF (2015) Attribute-based access control. Computer 48:85–88CrossRef
14.
Zurück zum Zitat Jiang T, Chen X, Li J, Wong DS, Ma J, Liu JK (2014) Timer: secure and reliable cloud storage against data re-outsourcing. In: Proceedings of the 10th International conference on information security practice and experience—ISPE 2014, vol 8434. Springer, Fuzhou, pp 346–358 Jiang T, Chen X, Li J, Wong DS, Ma J, Liu JK (2014) Timer: secure and reliable cloud storage against data re-outsourcing. In: Proceedings of the 10th International conference on information security practice and experience—ISPE 2014, vol 8434. Springer, Fuzhou, pp 346–358
15.
Zurück zum Zitat Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8:1343–1354CrossRef Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8:1343–1354CrossRef
16.
Zurück zum Zitat Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In: Advances in cryptology—EUROCRYPT2011, vol 6632. Springer, Berlin, pp 568–588 Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In: Advances in cryptology—EUROCRYPT2011, vol 6632. Springer, Berlin, pp 568–588
17.
Zurück zum Zitat Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12 Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12
19.
Zurück zum Zitat Li W, Xue K, Xue Y, Hong J (2016) TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans Parallel Distrib Syst 27:1484–1496CrossRef Li W, Xue K, Xue Y, Hong J (2016) TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans Parallel Distrib Syst 27:1484–1496CrossRef
20.
Zurück zum Zitat Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo KKR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443 Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo KKR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443
21.
Zurück zum Zitat Li X, Niu J, Kumari S, Wu F, Choo KKR (2018) A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Future Gener Comput Syst 83:607–618 Li X, Niu J, Kumari S, Wu F, Choo KKR (2018) A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Future Gener Comput Syst 83:607–618
22.
Zurück zum Zitat Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KKR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204 Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KKR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204
23.
Zurück zum Zitat Liang K, Au MH, Liu JK, Susilo W, Wong DS, Yang G, Yu Y, Yang A (2015) A secure and eddicient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Gener Comput Syst 52:95–108CrossRef Liang K, Au MH, Liu JK, Susilo W, Wong DS, Yang G, Yu Y, Yang A (2015) A secure and eddicient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Gener Comput Syst 52:95–108CrossRef
25.
Zurück zum Zitat PublicLaw (1996) Health insurance protability and accountability act of 1996. 104th Congress PublicLaw (1996) Health insurance protability and accountability act of 1996. 104th Congress
26.
Zurück zum Zitat Qian H, Li J, Zhang Y, Han J (2015) Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int J Inf Secur 14:487–497CrossRef Qian H, Li J, Zhang Y, Han J (2015) Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int J Inf Secur 14:487–497CrossRef
27.
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology—EUROCRYPT2005, vol 3494. Springer, Aarhus, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology—EUROCRYPT2005, vol 3494. Springer, Aarhus, pp 457–473
28.
Zurück zum Zitat Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7:743–754CrossRef Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7:743–754CrossRef
29.
Zurück zum Zitat Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage service. In: Proceedings of the 17th ACM computer and communications security–CCS2010. ACM, Chicago, pp 735–737 Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage service. In: Proceedings of the 17th ACM computer and communications security–CCS2010. ACM, Chicago, pp 735–737
30.
Zurück zum Zitat Wang H, Zheng Z, Wu L, He D (2016) New large-universe multi-authority ciphertext-policy abe scheme and its application in cloud storage systems. J High Speed Netw 22:153–167 Wang H, Zheng Z, Wu L, He D (2016) New large-universe multi-authority ciphertext-policy abe scheme and its application in cloud storage systems. J High Speed Netw 22:153–167
31.
Zurück zum Zitat Wang S, Yu J, Zhang P, Wang P (2015) A novel file hierarchy access control scheme using attribute-based encryption. Appl Mech Mater 701–702:911–918 Wang S, Yu J, Zhang P, Wang P (2015) A novel file hierarchy access control scheme using attribute-based encryption. Appl Mech Mater 701–702:911–918
32.
Zurück zum Zitat Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11:1265–1277 Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11:1265–1277
33.
Zurück zum Zitat Zhang Y, Chen X, Li J, SWong D, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61 Zhang Y, Chen X, Li J, SWong D, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61
34.
Zurück zum Zitat Zhang Y, Li J, Zheng D, Chen X, Li H (2017) Towards privacy protection and malicious behavior traceability in smart health. Pers Ubiquit Comput 21:815–830CrossRef Zhang Y, Li J, Zheng D, Chen X, Li H (2017) Towards privacy protection and malicious behavior traceability in smart health. Pers Ubiquit Comput 21:815–830CrossRef
35.
Zurück zum Zitat Zhang Z, Li C, Gupta B, Niu D (2018) Efficient compressed ciphertext length scheme using multi-authority CP-ABE for hierarchical attributes. IEEE Access 6:38,273–38,284CrossRef Zhang Z, Li C, Gupta B, Niu D (2018) Efficient compressed ciphertext length scheme using multi-authority CP-ABE for hierarchical attributes. IEEE Access 6:38,273–38,284CrossRef
36.
Zurück zum Zitat Zhong H, Zhu W, Xu Y, Cui J (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22:243–251 Zhong H, Zhu W, Xu Y, Cui J (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22:243–251
Metadaten
Titel
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud
verfasst von
Rui Guo
Xiong Li
Dong Zheng
Yinghui Zhang
Publikationsdatum
22.10.2018
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 7/2020
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2644-7

Weitere Artikel der Ausgabe 7/2020

The Journal of Supercomputing 7/2020 Zur Ausgabe