Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-031-49099-6_17guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing

Published: 16 December 2023 Publication History

Abstract

Smart hospitals are leveraging cloud computing as a practical platform for storing and sharing medical data, enhancing medical analyses. However, entrusting sensitive medical data to third parties poses risks to patient privacy. Cloud-based data sharing also leads to many hazards, including latency challenges and bandwidth concerns when accessing data through cloud storage. To address these security flaws inherent in centralized cloud systems, this study proposes employing ciphertext policy-sensitive attribute-based signcryption with verifiable designcryption within a spatially distributed fog environment. This method signs messages using sensitive attributes and access entitlements, organized in a tree structure alongside non-sensitive attributes. The proposed approach integrates attribute-based encryption, ensuring fine-grained access control and digital signatures to guarantee data authenticity and secrecy. Unlike conventional cloud computing, the data distribution occurs in fog computing, facilitating swift data analysis. Spatial data distribution via fog nodes offers advantages such as low latency, optimized bandwidth usage, offline capabilities, enhanced privacy and security, scalability, and improved redundancy. These benefits position fog computing as a crucial element in real-time, location-based data processing for data sharing applications. The proposed method incorporates secure data authentication, access controls, and resistance against message attacks. To assess its effectiveness, a comparative analysis is conducted with existing methods, focusing primarily on computational efficiency. This scientific evaluation aims to offer insights into the advantages and limitations of the proposed approach.

References

[1]
Debnath S, Nunsanga MVL, and Bhuyan B Biswas U, Banerjee A, Pal S, Biswas A, Sarkar D, and Haldar S Study and scope of signcryption for cloud data access control Advances in Computer, Communication and Control 2019 Singapore Springer 113-126
[2]
Iqbal, J., Umar, A.I., Amin, N., Waheed, A.: Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain. Int. J. Distrib. Sens. Netw. 15(9) (2019)
[3]
Zahmatkesh H and Al-Turjman F Fog computing for sustainable smart cities in the IoT era: caching techniques and enabling technologies-an overview Sustain. Cities Soc. 2020 59
[4]
Alli AA and Alam MM The Fog cloud of things: a survey on concepts, architecture, standards, tools, and applications Internet Things 2020 9
[5]
Jalali F, Hinton K, Ayre R, Alpcan T, and Tucker RS Fog computing may help to save energy in cloud computing IEEE J. Sel. Areas Commun. 2016 34 5 1728-1739
[6]
Bao, Y., Qiu, W., Cheng, X.: Secure and lightweight fine-grained searchable data sharing for IoT-oriented and cloud-assisted smart healthcare system. IEEE Internet Things J. 9(4), 2513–2526 (2021)
[7]
Wang Y, Pang H, Deng RH, Ding Y, Wu Q, and Qin B Securing messaging services through efficient signcryption with designated equality test Inf. Sci. 2019 490 146-165
[8]
Lin XJ, Sun L, and Qu H Generic construction of public key encryption, identity-based encryption and signcryption with equality test Inf. Sci. 2018 453 111-126
[9]
Zhang, R., Wang, J., Song, Z., Wang, X.: An enhanced searchable encryption scheme for secure data outsourcing. Sci. China Inf. Sci. 63(3) (2020)
[10]
Yang X, Li T, Xi W, Chen A, and Wang C A blockchain-assisted verifiable outsourced attribute based signcryption scheme for EHRs sharing in the cloud IEEE Access 2020 8 170713-170731
[11]
Deng F, Wang Y, Peng L, Lai M, and Geng J Revocable cloud-assisted attribute-based signcryption in personal health system IEEE Access 2019 7 120950-120960
[12]
Yu J, Liu S, Wang S, Xiao Y, and Yan B LHABSC: a lightweight hybrid attribute-based signcryption scheme for cloud-fog assisted IoT IEEE Internet Things J. 2020 7 9 7949-7966
[13]
Rao YS A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing Future Gener. Comput. Syst. 2017 67 133-151
[14]
Deng F, Wang Y, Li Peng H, Xiong JG, and Qin Z Ciphertext-policy attribute-based signcryption with verifiable outsourced designcryption for sharing personal health records IEEE Access 2018 6 39473-39486
[15]
Hong H and Sun Z An efficient and secure attribute based signcryption scheme with LSSS access structure Springerplus 2016 5 1 1-10
[16]
Yu J, Liu S, Wang S, Xiao Y, and Yan B LH-ABSC: a lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT IEEE Internet Things J. 2020 7 9 7949-7966
[17]
Liu J, Huang X, and Liu JK Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption Futur. Gener. Comput. Syst. 2015 52 67-76
[18]
Belguith, S., Kaaniche, N., Mohamed, M., Russello, G.: C-ABSC: cooperative attribute based signcryption scheme for internet of things applications. In: IEEE International Conference on Services Computing (SCC), pp. 245–248. IEEE (2018)
[19]
Alsharif, A., Shafee, A., Nabil, M., Mahmoud, M., Alasmary, W.: A multi-authority attribute-based signcryption scheme with efficient revocation for smart grid downlink communication. In: International Conference on Internet of Things and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1025–1032. IEEE (2019)
[20]
Khasawneh S and Kadoch M ECS-CP-ABE: a lightweight elliptic curve signcryption scheme based on ciphertext-policy attribute-based encryption to secure downlink multicast communication in edge envisioned advanced metering infrastructure networks Trans. Emerg. Telecommun. Technol. 2021 32 8
[21]
Bao Y, Qiu W, Tang P, and Cheng X Efficient, revocable, and privacy-preserving fine-grained data sharing with keyword search for the cloud-assisted medical IoT system IEEE J. Biomed. Health Inf. 2021 26 5 2041-2051
[22]
Liu H, Gu T, Shojafar M, Alazab M, and Liu Y OPERA: optional dimensional privacy-preserving data aggregation for smart healthcare systems IEEE Trans. Ind. Inform. 2022 19 1 857-866
[23]
Elayan H, Aloqaily M, and Guizani M Sustainability of healthcare data analysis IoT-based systems using deep federated learning IEEE Internet Things J. 2021 9 10 7338-7346

Index Terms

  1. Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        Information Systems Security: 19th International Conference, ICISS 2023, Raipur, India, December 16–20, 2023, Proceedings
        Dec 2023
        495 pages
        ISBN:978-3-031-49098-9
        DOI:10.1007/978-3-031-49099-6

        Publisher

        Springer-Verlag

        Berlin, Heidelberg

        Publication History

        Published: 16 December 2023

        Author Tags

        1. Data sharing
        2. Security
        3. Access control
        4. Signcryption
        5. Fog computing

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 0
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 16 Nov 2024

        Other Metrics

        Citations

        View Options

        View options

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media