A Distributed Access Control with Outsourced Computation in Fog Computing

With the rapid development of information technology and the Internet of Things Technology (IOT), data security and healthy privacy are getting a lot of attention. In order to store, access, and share electronic health records, storage of this data is transferred to a third-party-cloud server. The security and privacy of electronic health records stored at date center or cloud server are not guaranteed. Before being sent to date center or cloud server, this data should be encrypted. Designing an efficient and secure fine-grained access control strategy for personal health records is facing enormous challenges. Security and privacy for electronic health records are very important because the electronic health data which plays an important role in medical server and treatment is directly associated with a particular patient. Attribute-based encryption (ABE) can effectively achieve fine-grained access control. However, the computation of bilinear pairings requires a large amount of computation overhead in ABE scheme. In order to decrease the computational overhead and ensure the confidentiality of electronic health records, a distributed fine-grained access control scheme with outsourced computation for IOT is proposed in this paper. Little calculation is executed by the receiver and sender in our proposed scheme. Outsourcing computing reduces the computing burden. The analyses of safety and performance show that our proposed scheme is safe and effective compared with previous schemes.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Ruei-Hau Hsu,et al.  Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions , 2019, IEEE Consumer Electronics Magazine.

[3]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[4]  Kim-Kwang Raymond Choo,et al.  Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective , 2017, IEEE Cloud Computing.

[5]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[6]  Huaqun Wang,et al.  Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems , 2017, IEEE Access.

[7]  Amos Beimel,et al.  Secret-Sharing Schemes: A Survey , 2011, IWCC.

[8]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[9]  Rui Guo,et al.  A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience , 2018, Secur. Commun. Networks.

[10]  Moni Naor,et al.  How to Share a Secret, Infinitely , 2016, IEEE Transactions on Information Theory.

[11]  Jian Shen,et al.  Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices , 2017, Soft Comput..

[12]  Hao Wang,et al.  New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems , 2016, J. High Speed Networks.

[13]  Jinguang Han,et al.  VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud , 2020, IEEE Transactions on Services Computing.

[14]  Huaqun Wang,et al.  Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme , 2012, IET Inf. Secur..

[15]  Victor I. Chang,et al.  Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..

[16]  Qixiang Mei,et al.  Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption , 2016, IEEE Transactions on Dependable and Secure Computing.

[17]  R.T.Subhalakshmi,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption , 2016 .

[18]  Huaqun Wang,et al.  Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession , 2019, IEEE Transactions on Services Computing.

[19]  Xiaofeng Liao,et al.  Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.

[20]  Dijiang Huang,et al.  Efficient Attribute-Based Comparable Data Access Control , 2015, IEEE Transactions on Computers.

[21]  Hsiao-Hwa Chen,et al.  An Integrated Architecture for Software Defined and Virtualized Radio Access Networks with Fog Computing , 2017, IEEE Network.

[22]  Willy Susilo,et al.  Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Chen Yanli,et al.  Attribute-based access control for multi-authority systems with constant size ciphertext in cloud computing , 2016 .

[24]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[25]  Sourya Joyee De,et al.  Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption , 2014, GLOBECOM 2014.

[26]  Hu Yuxiang,et al.  Using the cooperative game for service placement of virtual network functions , 2016, China Communications.

[27]  Matthew Green,et al.  Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.

[28]  Joseph K. Liu,et al.  Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption , 2015, Future Gener. Comput. Syst..

[29]  Josep Domingo-Ferrer,et al.  FRR: Fair remote retrieval of outsourced private medical records in electronic health networks , 2014, J. Biomed. Informatics.

[30]  Robert H. Deng,et al.  Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.

[31]  Y. Sreenivasa Rao,et al.  A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing , 2017, Future Gener. Comput. Syst..

[32]  Ivan Stojmenovic,et al.  Distributed Fine-Grained Access Control in Wireless Sensor Networks , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.

[33]  Rui Guo,et al.  Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud , 2017, ICCCS.

[34]  Ling Liu,et al.  Searchable Encryption for Healthcare Clouds: A Survey , 2018, IEEE Transactions on Services Computing.

[35]  Xin Wang,et al.  A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing , 2017, Sensors.