Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 4/2022

20.04.2022

Lightweight verifiable data management system for cloud-assisted wireless body area networks

verfasst von: Mohammad Ali, Ximeng Liu

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 4/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless body area networks (WBANs) consist of a number of low-power sensors, through which specialists can remotely monitor the real-time vital parameters of patients. This facility can improve healthcare quality and reduce associated costs considerably. However, WBAN devices typically have limited resources that severely hinder the quality of services. To alleviate these limitations, the concept of cloud-assisted WBANs has been proposed. In such networks, the cloud server provides extensive computational and storage resources for processing and storing the collected data. However, outsourcing data to a third-party provider raises concerns over data confidentiality, data integrity, and fine-grained access and search control. To address these concerns, we put forward a Lightweight Verifiable Data Management (LVDM) scheme. Our scheme offers efficient fine-grained access and search control mechanisms. Also, in LVDM, the computational overhead incurred by sensors is very low, and almost all computational tasks in the data encryption, data retrieval, and decryption phases are performed by the cloud server. Moreover, our scheme enables users to remotely check the data integrity and the accuracy of operations performed by the cloud. Our detailed security and performance analysis demonstrates that LVDM is provable secure and yields better performance over other similar schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
The python pairing based cryptography library, online: https://github.com/debatem1/pypbc
 
Literatur
1.
Zurück zum Zitat Alimorad N, Maadani M, Mahdavi M (2021) REO: a reliable and energy efficient optimization algorithm for Beacon-enabled 802.15. 4 based wireless body area networks. IEEE Sens J 21(17):19623-19630 Alimorad N, Maadani M, Mahdavi M (2021) REO: a reliable and energy efficient optimization algorithm for Beacon-enabled 802.15. 4 based wireless body area networks. IEEE Sens J 21(17):19623-19630
2.
Zurück zum Zitat Bai T, Lin J, Li G, Wang H, Ran P, Li Z, Pang Y, Wu W, Jeon G (2019) An optimized protocol for QoS and energy efficiency on wireless body area networks. Peer Peer Netw Appl 12(2):326–336CrossRef Bai T, Lin J, Li G, Wang H, Ran P, Li Z, Pang Y, Wu W, Jeon G (2019) An optimized protocol for QoS and energy efficiency on wireless body area networks. Peer Peer Netw Appl 12(2):326–336CrossRef
3.
Zurück zum Zitat Jovanov E, Milenkovic A, Otto C, De Groen PC (2005) A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. J Neuroeng Rehabil 2(1):1–10CrossRef Jovanov E, Milenkovic A, Otto C, De Groen PC (2005) A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. J Neuroeng Rehabil 2(1):1–10CrossRef
4.
Zurück zum Zitat Hayajneh T, Griggs K, Imran M, Mohd BJ (2019) Secure and efficient data delivery for fog-assisted wireless body area networks. Peer Peer Netw Appl 12(5):1289–1307CrossRef Hayajneh T, Griggs K, Imran M, Mohd BJ (2019) Secure and efficient data delivery for fog-assisted wireless body area networks. Peer Peer Netw Appl 12(5):1289–1307CrossRef
5.
Zurück zum Zitat Hu C, Li H, Huo Y, Xiang T, Liao X (2016) Secure and efficient data communication protocol for wireless body area networks. IEEE Trans Multi-Scale Comput Syst 2(2):94–107CrossRef Hu C, Li H, Huo Y, Xiang T, Liao X (2016) Secure and efficient data communication protocol for wireless body area networks. IEEE Trans Multi-Scale Comput Syst 2(2):94–107CrossRef
6.
Zurück zum Zitat Wan J, Zou C, Ullah S, Lai CF, Zhou M, Wang X (2013) Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Netw 27(5):56–61CrossRef Wan J, Zou C, Ullah S, Lai CF, Zhou M, Wang X (2013) Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Netw 27(5):56–61CrossRef
7.
Zurück zum Zitat Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef
8.
Zurück zum Zitat He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J 12(1):64–73CrossRef He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J 12(1):64–73CrossRef
9.
Zurück zum Zitat Ali M, Mohajeri J, Sadeghi MR, Liu X (2020) A fully distributed hierarchical attribute-based encryption scheme. Theoret Comput Sci 815:25–46MathSciNetCrossRef Ali M, Mohajeri J, Sadeghi MR, Liu X (2020) A fully distributed hierarchical attribute-based encryption scheme. Theoret Comput Sci 815:25–46MathSciNetCrossRef
11.
Zurück zum Zitat Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2016) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767–778CrossRef Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2016) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767–778CrossRef
12.
Zurück zum Zitat Miao Y, Ma J, Liu X, Li X, Liu Z, Li H (2017) Practical attribute-based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J 5(4):3008–3018CrossRef Miao Y, Ma J, Liu X, Li X, Liu Z, Li H (2017) Practical attribute-based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J 5(4):3008–3018CrossRef
13.
Zurück zum Zitat Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R (2018) Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot. Comput Netw 133:141–156CrossRef Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R (2018) Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot. Comput Netw 133:141–156CrossRef
14.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP'07) (pp. 321-334) IEEE Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP'07) (pp. 321-334) IEEE
15.
Zurück zum Zitat Green M, Hohenberger S, Waters B (2011) Outsourcing the Decryption of {ABE} Ciphertexts. In 20th USENIX Security Symposium (USENIX Security 11) (No. 3) Green M, Hohenberger S, Waters B (2011) Outsourcing the Decryption of {ABE} Ciphertexts. In 20th USENIX Security Symposium (USENIX Security 11) (No. 3)
16.
Zurück zum Zitat Liu Z, Jiang ZL, Wang X, Yiu SM (2018) Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating. J Netw Comput Appl 108:112–123CrossRef Liu Z, Jiang ZL, Wang X, Yiu SM (2018) Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating. J Netw Comput Appl 108:112–123CrossRef
17.
Zurück zum Zitat Zhang R, Ma H, Lu Y (2017) Fine-grained access control system based on fully outsourced attribute-based encryption. J Syst Softw 125:344–353CrossRef Zhang R, Ma H, Lu Y (2017) Fine-grained access control system based on fully outsourced attribute-based encryption. J Syst Softw 125:344–353CrossRef
18.
Zurück zum Zitat Ameri MH, Delavar M, Mohajeri J, Salmasizadeh M (2018) A key-policy attribute-based temporary keyword search scheme for secure cloud storage. IEEE Trans Cloud Comput 8(3):660–671CrossRef Ameri MH, Delavar M, Mohajeri J, Salmasizadeh M (2018) A key-policy attribute-based temporary keyword search scheme for secure cloud storage. IEEE Trans Cloud Comput 8(3):660–671CrossRef
20.
Zurück zum Zitat Sun W, Yu S, Lou W, Hou YT, Li H (2014) Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198CrossRef Sun W, Yu S, Lou W, Hou YT, Li H (2014) Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198CrossRef
21.
Zurück zum Zitat Wang H, Dong X, Cao Z (2017) Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search. IEEE Trans Serv Comput 13(6):1142–1151 Wang H, Dong X, Cao Z (2017) Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search. IEEE Trans Serv Comput 13(6):1142–1151
22.
Zurück zum Zitat Chen DR, Chiu WM (2017) Collaborative link-aware protocols for energy-efficient and QoS wireless body area networks using integrated sensors. IEEE Internet Things J 5(1):132–149CrossRef Chen DR, Chiu WM (2017) Collaborative link-aware protocols for energy-efficient and QoS wireless body area networks using integrated sensors. IEEE Internet Things J 5(1):132–149CrossRef
23.
Zurück zum Zitat Ali M, Sadeghi MR, Liu X (2020) Lightweight fine-grained access control for wireless body area networks. Sensors 20(4):1088CrossRef Ali M, Sadeghi MR, Liu X (2020) Lightweight fine-grained access control for wireless body area networks. Sensors 20(4):1088CrossRef
24.
Zurück zum Zitat Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354CrossRef Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354CrossRef
25.
Zurück zum Zitat Li J, Wang Y, Zhang Y, Han J (2017) Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans Serv Comput 13(3):478–487CrossRef Li J, Wang Y, Zhang Y, Han J (2017) Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans Serv Comput 13(3):478–487CrossRef
26.
Zurück zum Zitat Lin S, Zhang R, Ma H, Wang M (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(10):2119–2130CrossRef Lin S, Zhang R, Ma H, Wang M (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(10):2119–2130CrossRef
27.
Zurück zum Zitat Ning J, Cao Z, Dong X, Liang K, Ma H, Wei L (2017) Auditable \(\sigma\)-time outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Inf Forensics Secur 13(1):94–105 Ning J, Cao Z, Dong X, Liang K, Ma H, Wei L (2017) Auditable \(\sigma\)-time outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Inf Forensics Secur 13(1):94–105
29.
Zurück zum Zitat Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2017) Attribute-based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput 13(6):985–998 Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2017) Attribute-based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput 13(6):985–998
30.
Zurück zum Zitat Miao Y, Weng J, Liu X, Choo KKR, Liu Z, Li H (2018) Enabling verifiable multiple keywords search over encrypted cloud data. Inf Sci 465:21–37CrossRef Miao Y, Weng J, Liu X, Choo KKR, Liu Z, Li H (2018) Enabling verifiable multiple keywords search over encrypted cloud data. Inf Sci 465:21–37CrossRef
31.
Zurück zum Zitat Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 598-609) Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 598-609)
32.
Zurück zum Zitat Gazzoni Filho DL, Barreto PSLM (2006) Demonstrating data possession and uncheatable data transfer. IACR Cryptol. ePrint Arch. 2006:150 Gazzoni Filho DL, Barreto PSLM (2006) Demonstrating data possession and uncheatable data transfer. IACR Cryptol. ePrint Arch. 2006:150
33.
Zurück zum Zitat Wang H (2014) Identity-based distributed provable data possession in multicloud storage. IEEE Trans Serv Comput 8(2):328–340CrossRef Wang H (2014) Identity-based distributed provable data possession in multicloud storage. IEEE Trans Serv Comput 8(2):328–340CrossRef
34.
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption In: Annual International Conference on the Theory and Applications of Cryptographic Techniques 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption In: Annual International Conference on the Theory and Applications of Cryptographic Techniques 457–473
35.
Zurück zum Zitat Goyal V, Pandey O, Sahai A Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 89-98) Goyal V, Pandey O, Sahai A Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 89-98)
36.
Zurück zum Zitat Ali M, Mohajeri J, Sadeghi MR, Liu X (2020) Attribute-based fine-grained access control for outscored private set intersection computation. Inf Sci 536:222–243MathSciNetCrossRef Ali M, Mohajeri J, Sadeghi MR, Liu X (2020) Attribute-based fine-grained access control for outscored private set intersection computation. Inf Sci 536:222–243MathSciNetCrossRef
37.
Zurück zum Zitat Chegenizadeh M, Ali M, Mohajeri J, Aref MR (2021) HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices. arXiv preprint arXiv:2107.10133 Chegenizadeh M, Ali M, Mohajeri J, Aref MR (2021) HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices. arXiv preprint arXiv:​2107.​10133
38.
Zurück zum Zitat Ali M, Sadeghi MR, Liu X (2020) Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things. IEEE Access 8:23951–23964CrossRef Ali M, Sadeghi MR, Liu X (2020) Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things. IEEE Access 8:23951–23964CrossRef
39.
Zurück zum Zitat Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In Proceeding 2000 IEEE Symposium on Security and Privacy. S&P (pp. 44-55) Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In Proceeding 2000 IEEE Symposium on Security and Privacy. S&P (pp. 44-55)
40.
Zurück zum Zitat Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506-522). Springer, Berlin, Heidelberg Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506-522). Springer, Berlin, Heidelberg
41.
Zurück zum Zitat Guan Z, Liu X, Wu L, Wu J, Xu R, Zhang J, Li Y (2020) Cross-lingual multi-keyword rank search with semantic extension over encrypted data. Inf Sci 514:523–540CrossRef Guan Z, Liu X, Wu L, Wu J, Xu R, Zhang J, Li Y (2020) Cross-lingual multi-keyword rank search with semantic extension over encrypted data. Inf Sci 514:523–540CrossRef
42.
Zurück zum Zitat Ali M, Sadeghi MR (2021) Provable secure lightweight attribute–based keyword search for cloud-Internet of Things networks. Trans Emerg Telecommun Technol 32(5):e3905 Ali M, Sadeghi MR (2021) Provable secure lightweight attribute–based keyword search for cloud-Internet of Things networks. Trans Emerg Telecommun Technol 32(5):e3905
46.
Zurück zum Zitat Deswarte Y, Quisquater JJ, Sadane A (2003) Remote integrity checking. In Working conference on integrity and internal control in information systems (pp. 1-11). Springer, Boston, MA Deswarte Y, Quisquater JJ, Sadane A (2003)  Remote integrity checking. In Working conference on integrity and internal control in information systems (pp. 1-11). Springer, Boston, MA
47.
Zurück zum Zitat Juels, A, Kaliski Jr BS (2007) PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 584-597) Juels, A, Kaliski Jr BS (2007) PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 584-597)
48.
Zurück zum Zitat Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165–1176CrossRef Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165–1176CrossRef
50.
Zurück zum Zitat Mahmoody M, Pass R (2012) The curious case of non-interactive commitments–on the power of black-box vs. non-black-box use of primitives. In Annual Cryptology Conference (pp. 701-718). Springer, Berlin, Heidelberg Mahmoody M, Pass R (2012) The curious case of non-interactive commitments–on the power of black-box vs. non-black-box use of primitives. In Annual Cryptology Conference (pp. 701-718). Springer, Berlin, Heidelberg
51.
Zurück zum Zitat Katz J, Lindell Y (2020) Introduction to modern cryptography. CRC Press Katz J, Lindell Y (2020) Introduction to modern cryptography. CRC Press
Metadaten
Titel
Lightweight verifiable data management system for cloud-assisted wireless body area networks
verfasst von
Mohammad Ali
Ximeng Liu
Publikationsdatum
20.04.2022
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 4/2022
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01313-8

Weitere Artikel der Ausgabe 4/2022

Peer-to-Peer Networking and Applications 4/2022 Zur Ausgabe

Premium Partner