A Privacy-Aware and Traceable Fine-Grained Data Delivery System in Cloud-Assisted Healthcare IIoT

The emerging of healthcare Industrial Internet of Things (HealthIIoT) cannot only facilitate high-quality care services for patients but also enable efficient telemedicine platform for healthcare practitioners. However, it faces several fundamental security and privacy challenges, such as secure fine-grained data delivery, privacy preserving keyword-based ciphertext retrieval, malicious key delegation, and efficiency of the system. To combat these issues, we propose a privacy-aware and traceable fine-grained system (PTFS) for secure data delivery in cloud-assisted HealthIIoT. Compared to the existing solutions that only implement some of the preceding features, the proposed solution enables secure fine-grained data delivery, privacy-preserving data retrieval, efficient encryption and decryption operations, and trace of malicious key delegation simultaneously. For security analysis, rigorous proofs of the proposed scheme are provided to prove its security. In addition, extensive simulations and experiments are conducted for performance evaluation, which demonstrate the feasibility and effectiveness of PTFS.

[1]  Ning Zhang,et al.  Physical Layer based Message Authentication with Secure Channel Codes , 2020, IEEE Transactions on Dependable and Secure Computing.

[2]  Muhammad Khurram Khan,et al.  Data and Privacy: Getting Consumers to Trust Products Enabled by the Internet of Things , 2019, IEEE Consumer Electronics Magazine.

[3]  Ju Ren,et al.  Fog-Enabled Smart Health: Toward Cooperative and Secure Healthcare Service Provision , 2019, IEEE Communications Magazine.

[4]  Zhiqiu Huang,et al.  SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare , 2020, IEEE Transactions on Network and Service Management.

[5]  Ning Zhang,et al.  Online Proactive Caching in Mobile Edge Computing Using Bidirectional Deep Recurrent Neural Network , 2019, IEEE Internet of Things Journal.

[6]  Ning Zhang,et al.  S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol , 2017, IEEE Internet of Things Journal.

[7]  Yanping Li,et al.  VPAMS: Verifiable and practical attribute-based multi-keyword search over encrypted cloud data , 2020, J. Syst. Archit..

[8]  Hua Zhang,et al.  Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing , 2022, IEEE Transactions on Services Computing.

[9]  Hu Xiong,et al.  Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT , 2019, 2019 IEEE Conference on Dependable and Secure Computing (DSC).

[10]  Xuemin Shen,et al.  An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security , 2018, IEEE Journal on Selected Areas in Communications.

[11]  Zhen Liu,et al.  White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures , 2013, IEEE Transactions on Information Forensics and Security.

[12]  Kuan-Ching Li,et al.  A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection , 2022, IEEE Transactions on Dependable and Secure Computing.

[13]  Yiwei Thomas Hou,et al.  Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud , 2016, IEEE Transactions on Parallel and Distributed Systems.

[14]  Yi Mu,et al.  Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation , 2019, Inf. Sci..

[15]  Shouhuai Xu,et al.  VABKS: Verifiable attribute-based keyword search over outsourced encrypted data , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[16]  Jiguo Li,et al.  KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage , 2017, IEEE Transactions on Services Computing.

[17]  Yuguang Fang,et al.  Practical Privacy-Preserving ECG-Based Authentication for IoT-Based Healthcare , 2019, IEEE Internet of Things Journal.

[18]  Dan Boneh,et al.  Short Signatures Without Random Oracles , 2004, EUROCRYPT.

[19]  Jiguo Li,et al.  Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage , 2017, Int. J. Commun. Syst..

[20]  Xiaolei Dong,et al.  White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Willy Susilo,et al.  Secure Keyword Search and Data Sharing Mechanism for Cloud Computing , 2020, IEEE Transactions on Dependable and Secure Computing.

[22]  Rui Zhang,et al.  Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack , 2016, Science China Information Sciences.

[23]  Guomin Yang,et al.  Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions , 2016, IEEE Transactions on Information Forensics and Security.

[24]  Hongyi Wu,et al.  Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[25]  Robert H. Deng,et al.  Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things , 2019, IEEE Internet of Things Journal.

[26]  Jianfeng Ma,et al.  Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing , 2018, IEEE Internet of Things Journal.

[27]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[28]  Chanil Park,et al.  An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs , 2016, IEEE Transactions on Computers.

[29]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[30]  Willy Susilo,et al.  Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.

[31]  Robert H. Deng,et al.  Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting , 2019, IEEE Transactions on Dependable and Secure Computing.

[32]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[33]  Zhi Guan,et al.  Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach , 2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS).

[34]  Qingyi Zhu,et al.  Applications of Distributed Ledger Technologies to the Internet of Things , 2019, ACM Comput. Surv..

[35]  Ning Zhang,et al.  RAV: Relay Aided Vectorized Secure Transmission in Physical Layer Security for Internet of Things Under Active Attacks , 2019, IEEE Internet of Things Journal.

[36]  Robert H. Deng,et al.  Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.

[37]  Yingjiu Li,et al.  Lightweight Sharable and Traceable Secure Mobile Health System , 2020, IEEE Transactions on Dependable and Secure Computing.

[38]  Robert H. Deng,et al.  A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks , 2020, IEEE Transactions on Vehicular Technology.