Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 2/2024

31-01-2024

Extended chaotic map-based key management for hierarchical access control in e-medicine systems

Authors: Tian-Fu Lee, I-Pin Chang, Jyun-Guo Wang, Yen-Chang Chen, Sheng-Tzung Tsai, Rui-Yu Chen

Published in: Peer-to-Peer Networking and Applications | Issue 2/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Hierarchical access control key management is a technique that involves grouping users into several categories such that each group has a distinct level of authority, thereby reducing the inconvenience that users and administrators face in storing and managing keys. The primary objective of the key management scheme is to distribute keys efficiently and manage them dynamically. Several hierarchical access control key management schemes have recently been proposed to protect e-medicine systems' security. However, these schemes often have security vulnerabilities or require significant storage space and computation. As the hospital organizational structure differs from the standard hierarchical structure, the current hierarchical access control scheme cannot fully leverage the original access control scheme's benefits. Recently, enhanced Chebyshev chaotic maps have shown superiority over traditional cryptographic systems that use modular exponent operations, exhibiting semi-group and commutative properties. This study proposes a secure and efficient key management scheme for e-medical systems using enhanced Chebyshev chaotic maps. Compared with related schemes, the proposed scheme addresses previous security limitations and outperforms other schemes in terms of functionality and performance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Akl SG, Taylor PD (1983) Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst 1(3):239–248 Akl SG, Taylor PD (1983) Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst 1(3):239–248
2.
go back to reference Jeng FG, Wang CM (2006) An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. J Syst Softw 79(8):1161–1167CrossRef Jeng FG, Wang CM (2006) An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. J Syst Softw 79(8):1161–1167CrossRef
3.
go back to reference Chung YF, Lee HH, Lai F, Chen TS (2008) Access control in user hierarchy based on elliptic curve cryptosystem. Inf Sci 178(1):230–243MathSciNetCrossRef Chung YF, Lee HH, Lai F, Chen TS (2008) Access control in user hierarchy based on elliptic curve cryptosystem. Inf Sci 178(1):230–243MathSciNetCrossRef
4.
go back to reference Edmund LCS, Ramaiah CK, Gulla SP (2009) Electronic medical records management systems: An overview. DESIDOC J Libr Inf Technol 29(6):3CrossRef Edmund LCS, Ramaiah CK, Gulla SP (2009) Electronic medical records management systems: An overview. DESIDOC J Libr Inf Technol 29(6):3CrossRef
5.
go back to reference Heart T, Ben-Assuli O, Shabtai I (2017) A review of PHR, EMR and EHR integration: A more personalized healthcare and public health policy. Health Policy Technol 6(1):20–25CrossRef Heart T, Ben-Assuli O, Shabtai I (2017) A review of PHR, EMR and EHR integration: A more personalized healthcare and public health policy. Health Policy Technol 6(1):20–25CrossRef
6.
go back to reference Lee TF, Chang IP, Su GJ (2023) Compliance with HIPAA and GDPR in certificateless-based authenticated key agreement using extended chaotic maps. Electronics 12(5):1108CrossRef Lee TF, Chang IP, Su GJ (2023) Compliance with HIPAA and GDPR in certificateless-based authenticated key agreement using extended chaotic maps. Electronics 12(5):1108CrossRef
7.
go back to reference Nikooghadam M, Zakerolhosseini A, Moghaddam ME (2010) Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J Syst Softw 83(10):1917–1929CrossRef Nikooghadam M, Zakerolhosseini A, Moghaddam ME (2010) Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J Syst Softw 83(10):1917–1929CrossRef
8.
go back to reference Wu S, Chen K (2011) An efficient key-management scheme for hierarchical access control in E-Medicine system. J Med Syst 36(4):2325–2337CrossRef Wu S, Chen K (2011) An efficient key-management scheme for hierarchical access control in E-Medicine system. J Med Syst 36(4):2325–2337CrossRef
9.
go back to reference Nikooghadam M, Zakerolhosseini A (2012) Secure communication of medical information using mobile agents. J Med Syst 36(6):3839–3850CrossRef Nikooghadam M, Zakerolhosseini A (2012) Secure communication of medical information using mobile agents. J Med Syst 36(6):3839–3850CrossRef
10.
go back to reference Hassen HR, Bettahar H, Bouadbdallah A, Challal Y (2012) An efficient key management scheme for content access control for linear hierarchies. Comput Netw 56(8):2107–2118CrossRef Hassen HR, Bettahar H, Bouadbdallah A, Challal Y (2012) An efficient key management scheme for content access control for linear hierarchies. Comput Netw 56(8):2107–2118CrossRef
11.
go back to reference Das AK, Paul NY, Tripathy L (2012) Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Inf Sci 209(20):80–92MathSciNetCrossRef Das AK, Paul NY, Tripathy L (2012) Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Inf Sci 209(20):80–92MathSciNetCrossRef
12.
go back to reference Odelu V, Das AK, Goswami A (2013) An effective and secure key-management scheme for hierarchical access control in e-medicine system. J Med Syst 37(2) Odelu V, Das AK, Goswami A (2013) An effective and secure key-management scheme for hierarchical access control in e-medicine system. J Med Syst 37(2)
13.
go back to reference Chao WY, Tsai CY, Hwang MS (2017) An improved key-management scheme for hierarchical access control. Int J Netw Secur 19(4):639–643 Chao WY, Tsai CY, Hwang MS (2017) An improved key-management scheme for hierarchical access control. Int J Netw Secur 19(4):639–643
14.
go back to reference Sivasundari A, Ramakrishnan M (2018) Hybrid PRNS version of elliptic curve cryptography with signcryption based security enhancement technique for dynamic key management system. J Comput Theor Nanosci 15(1):299–310CrossRef Sivasundari A, Ramakrishnan M (2018) Hybrid PRNS version of elliptic curve cryptography with signcryption based security enhancement technique for dynamic key management system. J Comput Theor Nanosci 15(1):299–310CrossRef
15.
go back to reference Lin YL, Hsu CL (2011) Secure key management scheme for dynamic hierarchical access control based on ECC. J Syst Softw 84(4):679–685MathSciNetCrossRef Lin YL, Hsu CL (2011) Secure key management scheme for dynamic hierarchical access control based on ECC. J Syst Softw 84(4):679–685MathSciNetCrossRef
16.
go back to reference Xing Q, Wang B, Wang X, Chen P, Yu B, Tang Y, Gao X (2016) Unbounded revocable hierarchical identity-based encryption with adaptive-id security. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 430–437). IEEE Xing Q, Wang B, Wang X, Chen P, Yu B, Tang Y, Gao X (2016) Unbounded revocable hierarchical identity-based encryption with adaptive-id security. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 430–437). IEEE
17.
go back to reference Pareek G, Purushothama BR (2019) Extended hierarchical key assignment scheme (E-HKAS): how to efficiently enforce explicit policy exceptions in dynamic hierarchies. Sādhanā 44(12):235MathSciNetCrossRef Pareek G, Purushothama BR (2019) Extended hierarchical key assignment scheme (E-HKAS): how to efficiently enforce explicit policy exceptions in dynamic hierarchies. Sādhanā 44(12):235MathSciNetCrossRef
18.
go back to reference Abi-Char PE, Nader P, Mahfouz S (2021) A secure key management scheme for hierarchical access control with secret key validity checking. In: 2021 44th International Conference on Telecommunications and Signal Processing (TSP) (pp 27–33). IEEE Abi-Char PE, Nader P, Mahfouz S (2021) A secure key management scheme for hierarchical access control with secret key validity checking. In: 2021 44th International Conference on Telecommunications and Signal Processing (TSP) (pp 27–33). IEEE
19.
go back to reference Xiao D, Liao XO, Deng SJ (2008) Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf Sci 178(6):1598–1602MathSciNetCrossRef Xiao D, Liao XO, Deng SJ (2008) Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf Sci 178(6):1598–1602MathSciNetCrossRef
20.
go back to reference Niu YJ, Wang XY (2011) An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 16(4):1986–1992MathSciNetCrossRef Niu YJ, Wang XY (2011) An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 16(4):1986–1992MathSciNetCrossRef
21.
go back to reference Xue KP, Hong PL (2012) Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 17(7):2969–2977MathSciNetCrossRef Xue KP, Hong PL (2012) Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 17(7):2969–2977MathSciNetCrossRef
22.
go back to reference Lee CC, Hsu SW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1–2):201–211MathSciNetCrossRef Lee CC, Hsu SW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1–2):201–211MathSciNetCrossRef
23.
go back to reference Lee CC, Chen CL, Wu CY, Huang SY (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1–2):79–87MathSciNetCrossRef Lee CC, Chen CL, Wu CY, Huang SY (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1–2):79–87MathSciNetCrossRef
24.
go back to reference Wang X, Zhao JF (2010) An improved key agreement protocol based on chaos. Commun Nonlinear Sci Numer Simul 15(12):4052–4057MathSciNetCrossRef Wang X, Zhao JF (2010) An improved key agreement protocol based on chaos. Commun Nonlinear Sci Numer Simul 15(12):4052–4057MathSciNetCrossRef
25.
26.
go back to reference Guo C, Chang CC (2013) Chaotic maps-based password-authenticated key agreement using smart cards. Commun Nonlinear Sci Numer Simul 18(6):1433–1440MathSciNetCrossRef Guo C, Chang CC (2013) Chaotic maps-based password-authenticated key agreement using smart cards. Commun Nonlinear Sci Numer Simul 18(6):1433–1440MathSciNetCrossRef
27.
go back to reference He DB, Chen YT, Chen JH (2012) Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149–1157MathSciNetCrossRef He DB, Chen YT, Chen JH (2012) Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149–1157MathSciNetCrossRef
28.
go back to reference Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Chaos, Solitons Fractals 39(3):1283–1289MathSciNetCrossRef Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Chaos, Solitons Fractals 39(3):1283–1289MathSciNetCrossRef
29.
go back to reference Bergamo P, D’Arco P, Santis AD, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. In: IEEE Transactions on Circuits and systems—I: Regular papers, Vol 52, No 7, pp1382–1393 Bergamo P, D’Arco P, Santis AD, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. In: IEEE Transactions on Circuits and systems—I: Regular papers, Vol 52, No 7, pp1382–1393
30.
go back to reference Zhang LH (2006) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solit Fractals 37(3):669–674MathSciNetCrossRef Zhang LH (2006) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solit Fractals 37(3):669–674MathSciNetCrossRef
Metadata
Title
Extended chaotic map-based key management for hierarchical access control in e-medicine systems
Authors
Tian-Fu Lee
I-Pin Chang
Jyun-Guo Wang
Yen-Chang Chen
Sheng-Tzung Tsai
Rui-Yu Chen
Publication date
31-01-2024
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 2/2024
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01621-7

Other articles of this Issue 2/2024

Peer-to-Peer Networking and Applications 2/2024 Go to the issue

Premium Partner