Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare

By sharing the personal health information (PHI) in the healthcare provider (HP) which is equipped with cloud servers, mobile-healthcare (m-healthcare) significantly promotes a huge revolution of medical consultation. Nonetheless there is a series of challenges such as PHI confidentiality and the attribute revocation. To deal with these problems, we propose a scheme based on the attribute-based encryption. The scheme which supports non-monotonic access structures and fine-grained attribute revocation is established over the composite order bilinear groups. By utilizing this scheme, we can well protect PHI and achieve the goal of revocation. Furthermore, the security analysis and comparison show that our scheme is more expressive despite of the lower efficiency.

[1]  Jin Li,et al.  Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2014, ProvSec.

[2]  Tatsuaki Okamoto,et al.  Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..

[3]  Qiang Li,et al.  An attribute based encryption scheme with fine-grained attribute revocation , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[4]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[5]  Kyung-Yong Chung,et al.  PHR Based Life Health Index Mobile Service Using Decision Support Model , 2016, Wirel. Pers. Commun..

[6]  Ming Li,et al.  Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.

[7]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[8]  Kim-Kwang Raymond Choo,et al.  Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds , 2016, Journal of Medical Systems.

[9]  Milan Petkovic,et al.  Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme , 2011, Communications and Multimedia Security.

[10]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[11]  Krishnamurthy Vidyasankar,et al.  A secure revocable personal health record system with policy-based fine-grained access control , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).

[12]  Vipul Goyal,et al.  Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..

[13]  Hideki Imai,et al.  Conjunctive Broadcast and Attribute-Based Encryption , 2009, Pairing.

[14]  Qinyi Li,et al.  An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext , 2013, Int. J. Netw. Secur..

[15]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[16]  Min-Shiang Hwang,et al.  A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing , 2016, Int. J. Netw. Secur..

[17]  Zhiguang Qin,et al.  Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme , 2015, Int. J. Netw. Secur..

[18]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[19]  Joseph K. Liu,et al.  Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption , 2015, Future Gener. Comput. Syst..

[20]  Katsuyuki Takashima,et al.  Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption , 2020, SCN.

[21]  Vinod Vaikuntanathan,et al.  Attribute-based encryption for circuits , 2013, STOC '13.

[22]  H. Raghav Rao,et al.  Factors influencing online health information search: An empirical analysis of a national cancer-related survey , 2014, Decis. Support Syst..

[23]  Jiguo Li,et al.  Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation , 2014, International Journal of Information Security.

[24]  Hu Xiong,et al.  Enabling Telecare Medical Information Systems With Strong Authentication and Anonymity , 2017, IEEE Access.

[25]  Rui Guo,et al.  Provably-Secure Certificateless Key Encapsulation Mechanism for e-Healthcare System , 2015, Int. J. Netw. Secur..

[26]  Brent Waters,et al.  Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..

[27]  L. Gatzoulis,et al.  Wearable and Portable eHealth Systems , 2007, IEEE Engineering in Medicine and Biology Magazine.

[28]  Yalin Chen,et al.  On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking" , 2015, Int. J. Netw. Secur..

[29]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[30]  Hui Li,et al.  Fine-grained Access Control and Revocation for Sharing Data on Clouds , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.

[31]  Jun Zhou,et al.  PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System , 2015, IEEE Transactions on Parallel and Distributed Systems.

[32]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[33]  Xiaojun Zhang,et al.  An Authenticated Privacy-preserving Attribute Matchmaking Protocol for Mobile Social Networks , 2015 .

[34]  Yao Zheng,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.

[35]  Pieter H. Hartel,et al.  Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application , 2009, WISA.

[36]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[37]  Brent Waters,et al.  Secure attribute-based systems , 2006, CCS '06.

[38]  Oscar Garcia Morchon,et al.  Efficient distributed security for wireless medical sensor networks , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.