浏览全部资源
扫码关注微信
1. 南京邮电大学计算机学院、软件学院、网络空间安全学院,江苏 南京 210023
2. 南京邮电大学物联网技术与应用协同创新中心,江苏 南京 210003
3. 南京邮电大学江苏省大数据安全与智能处理重点实验室,江苏 南京 210023
4. 南京邮电大学通信与信息工程学院,江苏 南京 210003
5. 福建师范大学数学与信息学院,福建 福州 350117
6. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
[ "李琦(1989-),男,江苏淮安人,博士,南京邮电大学讲师,主要研究方向为基于属性的密码学与访问控制技术。" ]
[ "朱洪波(1956-),男,江苏扬州人,南京邮电大学教授、博士生导师,主要研究方向为泛在无线通信与物联网技术、宽带无线通信、无线通信与电磁兼容。" ]
[ "熊金波(1981-),男,湖南益阳人,博士,福建师范大学副教授、硕士生导师,主要研究方向为云数据安全、移动数据安全等。" ]
[ "莫若(1990-),男,陕西渭南人,西安电子科技大学博士生,主要研究方向为数字签名。" ]
网络出版日期:2018-06,
纸质出版日期:2018-06-25
移动端阅览
李琦, 朱洪波, 熊金波, 等. mHealth中可追踪多授权机构基于属性的访问控制方案[J]. 通信学报, 2018,39(6):1-10.
Qi LI, Hongbo ZHU, Jinbo XIONG, et al. Multi-authority attribute-based access control system in mHealth with traceability[J]. Journal on communications, 2018, 39(6): 1-10.
李琦, 朱洪波, 熊金波, 等. mHealth中可追踪多授权机构基于属性的访问控制方案[J]. 通信学报, 2018,39(6):1-10. DOI: 10.11959/j.issn.1000-436x.2018100.
Qi LI, Hongbo ZHU, Jinbo XIONG, et al. Multi-authority attribute-based access control system in mHealth with traceability[J]. Journal on communications, 2018, 39(6): 1-10. DOI: 10.11959/j.issn.1000-436x.2018100.
移动健康护理作为一种新兴的技术给个人健康档案的分享提供了极大的便利,也给其隐私带来了极大的风险。基于属性的加密体制能够对加密数据实现细粒度的访问控制,有效地保护了个人健康档案的隐私。然而,目前基于属性的访问控制方案要么缺乏有效的恶意用户追踪机制,要么只支持单个授权机构。针对该问题,提出了一个移动健康护理环境下适应性安全的可追踪多授权机构基于属性的访问控制方案,该方案在合数群上构造,支持任意单调的线性秘密共享机制的访问策略,基于子群判定假设证明了该方案在标准模型下是适应性安全的,基于k-SDH假设证明了该方案的可追踪性,性能分析表明了该方案的实用性。
Mobile healthcare (mHealth) is an emerging technology which facilitates the share of personal health records (PHR)
however
it also brings the risk of the security and privacy of PHR.Attribute-based encryption (ABE) is regarded as a new cryptology to enhance fine-grained access control over encrypted data.However
existing attribute-based mHealth systems either lack of efficient traceable approach
or support only single authority.A traceable multi-authority attribute-based access control mHealth scheme was proposed
which was constructed over composite order groups and supports any monotonic access structures described by linear secret sharing scheme (LSSS).The adaptive security was proved under subgroup decisional assumptions.The traceability was proved under k-strong Diffie-Hellman (k-SDH) assumption.The performance analysis indicates that the proposed scheme is efficient and available.
PANAYIOTOU C , SAMARAS G . A mobile agent approach for ubiquitous and personalized eHealth information systems [J ] . Personalisation for E , 2008 :792.
ZHANG K , YANG K , LIANG X , et al . Security and privacy for mobile healthcare networks [J ] . IEEE Wireless Communications , 2015 , 22 ( 4 ): 104 - 112 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [C ] // Advances in Cryptology EUROCRYPT 2005,Lecture Notes in Computer Science . 2005 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM conference on Computer and communications security . 2006 : 89 - 98 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // Symposium on Security and Privacy . 2007 : 321 - 334 .
HAHN C , KWON H , HUR J . Efficient attribute-based secure data sharing with hidden policies and traceability in mobile health networks [J ] . Mobile Information Systems , 2016 :13.
ALSHEHRI S , RADZISZOWSKI S , AND RAJ R . Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption [C ] // IEEE 28th International Conference on Data Engineering Workshops (ICDEW ’12) , 2012 : 143 - 146 .
CHASE M , . Multi-authority attribute based encryption [M ] // Theory of Cryptography . Springer Berlin Heidelberg , 2007 : 515 - 534 .
CHASE M , CHOW S S M . Improving privacy and security in multi-authority attribute-based encryption [C ] // Conference on Computer and Communications Security . 2009 : 121 - 130 .
LI M , YU S , ZHENG Y , et al . Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption [J ] . IEEE Transactions on Parallel & Distributed Systems , 2012 , 24 ( 1 ): 131 - 143 .
LEWKO A , WATERS B . Decentralizing attribute-based encryption [C ] // International Conference on the Theory and Applications of Cryptographic Techniques . 2010 : 568 - 588 .
LIU Z , CAO Z , HUANG Q , et al . Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles [C ] // European Conference on Research in Computer Security . 2011 : 278 - 297 .
LI Q , MA J , LI R , et al . Secure,efficient and revocable multi-authority access control system in cloud storage [J ] . Computers & Security , 2016 , 59 ( C ): 45 - 59 .
LIU Z , CAO Z , WONG D S . White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 1 ): 76 - 88 .
LI J , HUANG Q , CHEN X , et al . Multi-authority ciphertext-policy attribute-based encryption with accountability [C ] // The 6th ACM Symposium on Information,Computer and Communications Security . 2011 : 386 - 390 .
GUAN Z , LI J , ZHANG Y , et al . An efficient traceable access control scheme with reliable key delegation in mobile cloud computing [J ] . EURASIP Journal on Wireless Communications and Networking , 2016 , 2016 ( 1 ):208.
LEWKO A , OKAMOTO T , SAHAI A , et al . Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption [C ] // International Conference on Theory and Applications of Cryptographic Techniques . 2010 : 62 - 91 .
BEIMEL A . Secure schemes for secret sharing and key distribution [J ] . DSc Dissertation , 1996 .
CARO A D , IOVINO V . jPBC:Java pairing based cryptography [J ] . Proceedings - International Symposium on Computers and Communications , 2011 , 22 ( 3 ): 850 - 855 .
0
浏览量
1323
下载量
6
CSCD
关联资源
相关文章
相关作者
相关机构