高级检索
    王静怡, 阚海斌. mHealth中细粒度策略隐藏和可追踪去中心访问控制方案[J]. 计算机研究与发展.
    引用本文: 王静怡, 阚海斌. mHealth中细粒度策略隐藏和可追踪去中心访问控制方案[J]. 计算机研究与发展.
    Wang Jingyi, Kan Haibin. Fine-Grained Policy-Hiding and Traceable Decentralized Access Control Scheme in mHealth[J]. Journal of Computer Research and Development.
    Citation: Wang Jingyi, Kan Haibin. Fine-Grained Policy-Hiding and Traceable Decentralized Access Control Scheme in mHealth[J]. Journal of Computer Research and Development.

    mHealth中细粒度策略隐藏和可追踪去中心访问控制方案

    Fine-Grained Policy-Hiding and Traceable Decentralized Access Control Scheme in mHealth

    • 摘要: 基于属性基加密的访问控制协议在个人健康档案共享中发挥着越来越重要的作用. 但传统的基于密文策略属性加密的访问控制方案存在着些许问题. 首先,中心化的属性授权机构的抗风险能力低. 其次,随密文发送未隐藏的访问策略可能会泄露患者的隐私. 此外,传统方案难以追踪恶意泄露密钥的用户. 为解决上述问题,提出一种适用于mHealth中细粒度策略隐藏和可追踪去中心访问控制方案. 实现了去中心化的属性授权机构. 属性由属性名称和属性值2部分构成,在加密阶段属性值隐藏在密文中,只对外公开通用的属性名称. 当密钥遭到恶意泄漏时,监管机构利用身份映射表可以追踪到恶意的用户. 经过实验模拟和对比分析,所提方案在安全性方面和性能上适用于实际的mHealth环境.

       

      Abstract: With the rapid development of Internet technology, the emergence of Mobile Health (mHealth) is expected to improve the quality of medical care. However, data security and user privacy issues in the mHealth field have not been fully resolved. The access control protocol based on Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising technique for the sharing of personal health records(PHRs). However, direct adoption of the traditional CP-ABE in mHealth causes many problems. First, Centralized attribute authority have low ability to resist risks. In addition, the access policies are in cleartext and leak the patient's privacy in the encrypted PHRs. Finally, it is difficult for the traditional CP-ABE scheme to track down the user who intentionally disclosed the private key. Therefore, to solve these problems, our propose a fine-grained policy-hiding and traceable decentralized access control in mHealth. This scheme implements a decentralized attribute authority mechanism. Each attribute is expressed by an attribute name and an attribute value. In the encryption phase, the attribute value is hidden in ciphertext and only generic attribute name is exposed. When the private key is maliciously leaked, the regulator can use the identity mapping table to trace the malicious user. Through experimental simulation and comparative analysis, this scheme is suitable for the actual mHealth environment in terms of security and performance.

       

    /

    返回文章
    返回