Citation: | Wang Jingyi, Kan Haibin. Fine-Grained Policy-Hiding and Traceable Decentralized Access Control Scheme in mHealth[J]. Journal of Computer Research and Development, 2024, 61(6): 1525-1535. DOI: 10.7544/issn1000-1239.202330092 |
With the rapid development of Internet technology, the emergence of mobile health (mHealth) is expected to improve the quality of medical care. However, data security and user privacy issues in the mHealth field have not been fully resolved. The access control protocol based on ciphertext-policy attribute-based encryption (CP-ABE) is a promising technique for the sharing of personal health records (PHRs). However, direct adoption of the traditional CP-ABE in mHealth causes many problems. Firstly, centralized attribute authority has low ability to resist risks. Secondly, the access policies are in cleartext and leak the patient’s privacy in the encrypted PHRs. Finally, it is difficult for the traditional CP-ABE scheme to track down the user who intentionally discloses the private key. Therefore, to solve these problems, we propose a fine-grained policy-hiding and traceable decentralized access control in mHealth. This scheme implements a decentralized attribute authority mechanism. Each attribute is expressed by an attribute name and an attribute value. In the encryption phase, the attribute value is hidden in ciphertext and only generic attribute name is exposed. When the private key is maliciously leaked, the regulator can use the identity mapping table to trace the malicious user. Through experimental simulation and comparative analysis, our scheme is suitable for the actual mHealth environment in terms of security and performance.
[1] |
Chen T S, Liu C H. Secure dynamic access control scheme of PHR in cloud computing[J]. Journal of Medical Systems, 2012, 36((2): ): 4005−4020
|
[2] |
Li Ming, Yu Shucheng, Ren Kui, et al. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings[C]//Proc of the 6th Int ICST Conf on Security and Privacy in Communication Networks. Berlin: Springer, 2010: 89−106
|
[3] |
Zhang Leyou, Hu Gongcheng, Mu Yi, et al. Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system[J]. IEEE Access, 2019, 7: 33202−33213 doi: 10.1109/ACCESS.2019.2902040
|
[4] |
Wang Changji, Liu Xuan, Li Wentao. Implementing a personal health record cloud platform using ciphertext-policy attribute-based encryption[C]//Proc of the 4th Int Conf on Intelligent Networking and Collaborative Systems. Piscataway, NJ : IEEE, 2012: 8−14
|
[5] |
Sun Jianfei, Xiong Hu, Liu Ximeng, et al. Lightweight and privacy-aware fine-grained access control for IoT-oriented smart health[J]. IEEE Internet of Things Journal, 2020, 7(7): 6566−6575 doi: 10.1109/JIOT.2020.2974257
|
[6] |
Sahai A, Waters B. Fuzzy identity-based encryption[C]//Proc of the 24th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2005: 457−473
|
[7] |
Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006: 89−98
|
[8] |
Wei Pengcheng, Wang Dahu, Zhao Yu, et al. Blockchain data-based cloud data integrity protection mechanism[J]. Future Generation Computer Systems, 2020, 102: 902−911 doi: 10.1016/j.future.2019.09.028
|
[9] |
Zikratov I, Kuzmin A, Akimenko V, et al. Ensuring data integrity using blockchain technology[C]//Proc of the 20th Conf of Open Innovations Association (FRUCT). Piscataway, NJ : IEEE, 2017: 534−539
|
[10] |
陈泽宁,张亮,张双俊,等. 基于区块链和去中心属性密码的访问控制身份方案[J]. 中国科学:信息科学,2021,51(8):1345−1359 doi: 10.1360/SSI-2020-0048
Chen Zening, Zhang Liang, Zhang Shuangjun, et al. Access control scheme on blockchain and decentralized attributed-based algorithm with identity[J]. SCIENTIA SINICA Informationis, 2021, 51(8): 1345−1359(in Chinese) doi: 10.1360/SSI-2020-0048
|
[11] |
方宁,刘百祥,阚海斌. 基于区块链和去中心可追踪属性签名的可控匿名认证方案[J]. 中国科学:信息科学,2021,51(10):1706−1720 doi: 10.1360/SSI-2021-0018
Fang Ning, Liu Baixiang, Kan Haibin. Controllable anonymous authentication scheme based on blockchain and decentralized traceable attribute-based signature[J]. SCIENTIA SINICA Informationis, 2021, 51(10): 1706−1720(in Chinese) doi: 10.1360/SSI-2021-0018
|
[12] |
袁和昕,刘百祥,阚海斌,等. 基于区块链和去中心不可否认属性签名的分布式公钥基础设施方案[J]. 中国科学:信息科学,2022,52(6):1135−1148
Yuan Hexin, Liu Baixiang, Kan Haibin, et al. Distributed public key infrastructure scheme based on blockchain and decentralized undeniable attribute-based signature[J]. SCIENTIA SINICA Informationis, 2022, 52((6): ): 1135−1148(in Chinese)
|
[13] |
Banerjee S, Bera B, Das A K, et al. Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT[J]. Computer Communications, 2021, 169: 99−113 doi: 10.1016/j.comcom.2021.01.023
|
[14] |
Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products[C]//Proc of the 27th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2008: 146−162
|
[15] |
Lai Junzuo, Deng R H, Li Yingjun. Expressive CP-ABE with partially hidden access structures[C]//Proc of the 7th ACM Symp on Information, Computer and Communications Security. New York: ACM, 2012: 18−19
|
[16] |
Zhang Yinghui, Zheng Dong, Deng R H. Security and privacy in smart health: Efficient policy-hiding attribute-based access control[J]. IEEE Internet of Things Journal, 2018, 5(3): 2130−2145 doi: 10.1109/JIOT.2018.2825289
|
[17] |
Li Qi, Zhang Yinghui, Zhang Tao, et al. HTAC: Fine-grained policy-hiding and traceable access control in mHealth[J]. IEEE Access, 2020, 8: 123430−123439 doi: 10.1109/ACCESS.2020.3004897
|
[18] |
Boneh D, Goh E J, Nissim K. Evaluating 2-DNF formulas on ciphertexts[C]//Proc of the 2nd Theory of Cryptography Conf. Berlin: Springer, 2005: 325−341
|
[19] |
Beimel A. Secure schemes for secret sharing and key distribution[D/OL].1996[2022-11-06].https://www.cs.bgu.ac.il/~beimel/Papers/thesis.pdf
|
[20] |
Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612−613 doi: 10.1145/359168.359176
|
[21] |
Blakley G R. Safeguarding cryptographic keys[C]//Proc of 1979 Int Workshop on Managing Requirements Knowledge. Los Alamitos, CA: IEEE Computer Society, 1979: 313−313
|
[22] |
Pedersen T P. A threshold cryptosystem without a trusted party[C]//Proc of the 10th Workshop on the Theory and Application of Cryptographic Techniques Brighton. Berlin: Springer, 1991: 522−526
|
[23] |
Phuong T V X, Yang G, Susilo W. Hidden ciphertext policy attribute-based encryption under standard assumptions[J]. IEEE Transactions on Information Forensics and Security, 2015, 11(1): 35−45
|
[24] |
Rouselakis Y, Waters B. Practical constructions and new proof methods for large universe attribute-based encryption[C]//Proc of the 2013 ACM SIGSAC Conf on Computer & Communications Security. New York: ACM, 2013: 463−474
|
[1] | Xue Zhihang, Xu Zheming, Lang Congyan, Feng Songhe, Wang Tao, Li Yidong. Text-to-Image Generation Method Based on Image-Text Semantic Consistency[J]. Journal of Computer Research and Development, 2023, 60(9): 2180-2190. DOI: 10.7544/issn1000-1239.202220416 |
[2] | Zhang Jing, Ju Jialiang, Ren Yonggong. Double-Generators Network for Data-Free Knowledge Distillation[J]. Journal of Computer Research and Development, 2023, 60(7): 1615-1627. DOI: 10.7544/issn1000-1239.202220024 |
[3] | Zhang Hao, Ma Jiayi, Fan Fan, Huang Jun, Ma Yong. Infrared and Visible Image Fusion Based on Multiclassification Adversarial Mechanism in Feature Space[J]. Journal of Computer Research and Development, 2023, 60(3): 690-704. DOI: 10.7544/issn1000-1239.202110639 |
[4] | Liu Guangrui, Zhang Weizhe, Li Xinjie. Data Contamination Defense Method for Intelligent Network Intrusion Detection Systems Based on Edge Examples[J]. Journal of Computer Research and Development, 2022, 59(10): 2348-2361. DOI: 10.7544/issn1000-1239.20220509 |
[5] | Guo Zhengshan, Zuo Jie, Duan Lei, Li Renhao, He Chengxin, Xiao Yingjie, Wang Peiyan. A Generative Adversarial Negative Sampling Method for Knowledge Hypergraph Link Prediction[J]. Journal of Computer Research and Development, 2022, 59(8): 1742-1756. DOI: 10.7544/issn1000-1239.20220074 |
[6] | Chen Dawei, Fu Anmin, Zhou Chunyi, Chen Zhenzhu. Federated Learning Backdoor Attack Scheme Based on Generative Adversarial Network[J]. Journal of Computer Research and Development, 2021, 58(11): 2364-2373. DOI: 10.7544/issn1000-1239.2021.20210659 |
[7] | Dai Hong, Sheng Lijie, Miao Qiguang. Adversarial Discriminative Domain Adaptation Algorithm with CapsNet[J]. Journal of Computer Research and Development, 2021, 58(9): 1997-2012. DOI: 10.7544/issn1000-1239.2021.20200569 |
[8] | Qian Yaguan, He Niannian, Guo Yankai, Wang Bin, Li Hui, Gu Zhaoquan, Zhang Xuhong, Wu Chunming. An Evasion Algorithm to Fool Fingerprint Detector for Deep Neural Networks[J]. Journal of Computer Research and Development, 2021, 58(5): 1106-1117. DOI: 10.7544/issn1000-1239.2021.20200903 |
[9] | Yu Haitao, Yang Xiaoshan, Xu Changsheng. Antagonistic Video Generation Method Based on Multimodal Input[J]. Journal of Computer Research and Development, 2020, 57(7): 1522-1530. DOI: 10.7544/issn1000-1239.2020.20190479 |
[10] | Tian Jiwei, Wang Jinsong, Shi Kai. Positive and Unlabeled Generative Adversarial Network on POI Positioning[J]. Journal of Computer Research and Development, 2019, 56(9): 1843-1850. DOI: 10.7544/issn1000-1239.2019.20180847 |