Disruption-tolerant network technologies are becoming solutions to access the confidential information or command by exploiting external storage node. It is necessary to encrypt the shared data to prevent illegal acce...
详细信息
ISBN:
(纸本)9781467397971
Disruption-tolerant network technologies are becoming solutions to access the confidential information or command by exploiting external storage node. It is necessary to encrypt the shared data to prevent illegal access to ciphertext by the third party. It is expected that commanders could control whether the user can decrypt the ciphertext or not. Besides, it is essential that a key authority distributing keys to users is decentralized to several authorities for avoiding the invasion from enemy. Thus, ciphertext-policy attribute-based encryption (CP-ABE) as a suitable encryption scheme for confidential data share and transmission is attracted attention under the military environment. In CP-ABE, the secret key of a user is associated with a set of atrributes;when attributes satisfy the access structure, the ciphertext is able to be decrypted. In this paper, we propose a CP-ABE scheme which can revoke attribute immediately with no updating user's secret key for attribute revocation. In addition, the length of key and ciphertext are fixed. Furthermore the proposed scheme has been compared with other CP-ABE schemes in key size, ciphertext size to validate its efficiency.
Healthcare Providers are widely using Cloud Computing to securely share Electronic Health Record(EHR). Entire EHR data cannot be disclosed to all the users with different privilege level, since it is more privacy sens...
详细信息
ISBN:
(纸本)9783319160863;9783319160856
Healthcare Providers are widely using Cloud Computing to securely share Electronic Health Record(EHR). Entire EHR data cannot be disclosed to all the users with different privilege level, since it is more privacy sensitive. So Healthcare Provider has to enforce a privacy preserved access control mechanism to efficiently share EHR. Privacy preserved secure data sharing is one of the most challenging issues in cloud environment. Existing access control mechanisms for data sharing do not consider the privacy of individuals, who are the subjects of data which is being shared while preventing user revocation problem. To address these problems, we are proposing a novel idea in which, users whose attributes satisfy the access policy and access rights are effective in access time can recover the corresponding data. Proposed scheme is able to ensure security, integrity, privacy preserved fine-grained access control and prevent data mining attacks on shared data. Even though this paper focuses on EHR sharing, it can be generalized to privacy preserved data sharing.
Cloud computing has generated a major impact on the global IT ecosystem, which promises economic advantages, speed, agility, flexibility, virtually infinite elasticity and innovation. However, data security and privac...
详细信息
ISBN:
(纸本)9781479974344
Cloud computing has generated a major impact on the global IT ecosystem, which promises economic advantages, speed, agility, flexibility, virtually infinite elasticity and innovation. However, data security and privacy remain the biggest barriers to widespread adoption of cloud services. To address the problem of fine-grained access control over encrypted data that is faced by cloud services, ciphertext-policy attribute-based encryption (CP-ABE) technology was proposed in recent years and has aroused great concern of researchers. Although CP-ABE schemes provide the ability for data owner-centric protection in cloud services, they are not very practical with the respect to the efficiency and scalability of access right revocation and key refreshing. Recently Xu and Martin proposed a dynamic user revocation and key refreshing model for CP-ABE schemes, and presented a concrete construction based on Bethencourt et al.'s CP-ABE scheme. They claimed that their construction is efficient and provable secure. However, after revisiting the construction, we demonstrate that cloud service provider can not perform data retrieval task in their construction, and their construction cannot achieve one-to-many encryption.
As an emerging patient-centric model of health information exchange, cloud-based personal health record (PHR) system holds great promise for empowering patients and ensuring more effective delivery of health care. In ...
详细信息
ISBN:
(纸本)9781479941711
As an emerging patient-centric model of health information exchange, cloud-based personal health record (PHR) system holds great promise for empowering patients and ensuring more effective delivery of health care. In this paper, we propose a novel patient-centric cloud-based secure PHR system, which allows patients to securely store their PHR data on the semi-trusted cloud service providers, and selectively share their PHR data with a wide range of users, including health care provider like doctors and nurses, family members or friends. To reduce the key management complexity for owners and users, we divide the users in the cloud-based PHR system into two security domains named public domain and personal domain. Different from previous cloud-based PHR system, PHR owners encrypt their PHR data for the public domain using ciphertext-policy attribute-based encryption scheme, while they encrypt their PHR data for the personal domain using anonymous multi-receiver identity-basedencryption scheme. Only authorized users whose credentials satisfy the specified ciphertext-policy or whose identities belong to dedicated identities can decrypt the encrypted PHR data, where ciphertext-policy or dedicated identities are embedded in the encrypted PHR data. Extensive analytical and experimental results are presented which show the patient-centric cloud-based secure PHR system is secure, scalable and efficient.
In a traditional ciphertext-policy attribute-based encryption (CP-ABE) scheme, an access structure, also refereed to as ciphertext-policy, is sent along with a ciphertext explicitly, and anyone who obtains a ciphertex...
详细信息
ISBN:
(纸本)9781450313032
In a traditional ciphertext-policy attribute-based encryption (CP-ABE) scheme, an access structure, also refereed to as ciphertext-policy, is sent along with a ciphertext explicitly, and anyone who obtains a ciphertext can know the access structure associated with the ciphertext. In certain applications, access structures contain sensitive information and must be protected from everyone except the users whose private key attributes satisfy the access structures. In this paper, we first propose a new model for CP-ABE with partially hidden access structures. In our model, each attribute consists of two parts: an attribute name and its value;if the private key attributes of a user do not satisfy the access structure associated with a ciphertext, the specific attribute values of the access structure are hidden, while other information about the access structure is public. based on the CP-ABE scheme proposed by Lewko et al. [14] recently, we then present an efficient construction of CP-ABE with partially hidden access structures. Compared to previous works in this field, our construction is more flexible and expressive and is proven fully secure in the standard model.
The key management of wireless sensor networks is one of the most important research topics for the secure communications. In light of the unique characteristics in Wireless sensor network such as large scale of deplo...
详细信息
ISBN:
(纸本)9781612841564
The key management of wireless sensor networks is one of the most important research topics for the secure communications. In light of the unique characteristics in Wireless sensor network such as large scale of deployment, mobility of nodes, node failures, communication failures and dynamic network topology, many dynamic key management schemes, such as SHELL and LOCK, have been proposed to guarantee the security of key management. But they could not conipletely. address. the collusion problem of key management in. wireless sensor networks. In this paper, we devote to solving this problem and present a novel scheme for secure communications in wireless sensor networks. Our scheme follows the architecture of the three layers in LOCK. Concretely, we employ the ciphertext-policyattributebasedencryption to refresh the group key in the upper layer and use EBS in the lower layer. Compared with related ones, our scheme can avoid the collusion attacks. Moreover, in the aspect of communication overhead, the number of messages for rekeying in our scheme can be largely reduced.
The key management of wireless sensor networks is one of the most important research topics for the secure communications. In light of the unique characteristics in Wireless sensor network such as large scale of deplo...
详细信息
The key management of wireless sensor networks is one of the most important research topics for the secure communications. In light of the unique characteristics in Wireless sensor network such as large scale of deployment, mobility of nodes, node failures, communication failures and dynamic network topology, many dynamic key management schemes, such as SHELL and LOCK, have been proposed to guarantee the security of key management. But they could not completely address the collusion problem of key management in wireless sensor networks. In this paper, we devote to solving this problem and present a novel scheme for secure communications in wireless sensor networks. Our scheme follows the architecture of the three layers in LOCK. Concretely, we employ the ciphertext-policyattributebasedencryption to refresh the group key in the upper layer and use EBS in the lower layer. Compared with related ones, our scheme can avoid the collusion attacks. Moreover, in the aspect of communication overhead, the number of messages for rekeying in our scheme can be largely reduced.
The key management of wireless sensor networks is one of the most important research topics for the secure *** light of the unique characteristics in Wireless sensor network such as large scale of deployment,mobility ...
详细信息
The key management of wireless sensor networks is one of the most important research topics for the secure *** light of the unique characteristics in Wireless sensor network such as large scale of deployment,mobility of nodes,node failures,communication failures and dynamic network topology,many dynamic key management schemes,such as SHELL and LOCK,have been proposed to guarantee the security of key *** they could not completely address the collusion problem of key management in wireless sensor *** this paper,we devote to solving this problem and present a novel scheme for secure communications in wireless sensor *** scheme follows the architecture of the three layers in LOCK. Concretely,we employ the ciphertext-policyattributebasedencryption to refresh the group key in the upper layer and use EBS in the lower layer. Compared with related ones,our scheme can avoid the collusion ***,in the aspect of communication overhead,the number of messages for rekeying in our scheme can be largely reduced.
In the age of technological advancement, collaborative E-healthcare emerges as a transformative system eliminating traditional location and accessibility barriers in healthcare services. Here, Searchable encryption (S...
详细信息
In the age of technological advancement, collaborative E-healthcare emerges as a transformative system eliminating traditional location and accessibility barriers in healthcare services. Here, Searchable encryption (SE) plays a key role in enabling healthcare providers to outsource encrypted medical data and search services to third parties like cloud servers, thereby reducing storage and management expenses. This intermediary approach poses challenges of single-point failure, privacy breaches, and potentially untrustworthy results. State-of-the-art public key-based SE methods use a cloud-assisted architecture that doesn’t support reliable and practical searches with fine-grained permissions. Also, such systems require additional support to address potential privacy leakages and ensure data availability at the storage server. To address these concerns, we propose a Blockchain-assisted Efficient and Secure Keyword Search (BESKS) scheme to enforce fine-grained keyword search privilege control while achieving practical search complexity. Our scheme employs a ciphertextpolicyattribute-based keyword search mechanism where keywords are encrypted using expressive access policies to build an inverted index structure. The encrypted indexes are stored on the blockchain while encrypted medical documents are stored on InterPlanetary File System (IPFS) nodes to enhance availability and ensure the reliability and scalability of our approach. Our scheme utilizes blockchain-based smart contract for efficient, secure search operations and ensures financial fairness in fine-grained searches. Search tokens are generated based on user attributes and query keywords to facilitate private searches on-chain. To enhance the search process, our secure index enables exact match for a query keyword in constant time to ensure expensive authorization operations are performed only once. Theoretical analysis suggests that our BESKS is more efficient and secure than state-of-the-art schemes. Prot
暂无评论