期刊
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS
卷 26, 期 5, 页码 1949-1960出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JBHI.2021.3075995
关键词
Encryption; Medical services; Security; Access control; Cloud computing; Surgery; Logic gates; 0-1 coding; weighted attribute; ciphertext-policy weighted attribute-based encryption; access policy; Internet of Health Things
类别
资金
- National Natural Science Foundation of China [61373163]
- Japan Society for the Promotion of Science (JSPS) [JP18K18044, 21K17736]
- Grants-in-Aid for Scientific Research [21K17736] Funding Source: KAKEN
The Internet of Health Things (IoHT) refers to uniquely identifiable devices connected to the Internet that can communicate with each other. This concept plays a crucial role in smart health monitoring and improvement systems, with cybersecurity being a top priority. This article proposes a novel access policy expression method and constructs a flexible and efficient encryption scheme to ensure data security in the IoHT.
The Internet of Health Things (IoHT) is a medical concept that describes uniquely identifiable devices connected to the Internet that can communicate with each other. As one of the most important components of smart health monitoring and improvement systems, the IoHT presents numerous challenges, among which cybersecurity is a priority. As a well-received security solution to achieve fine-grained access control, ciphertext-policy weighted attribute-based encryption (CP-WABE) has the potential to ensure data security in the IoHT. However, many issues remain, such as inflexibility, poor computational capability, and insufficient storage efficiency in attributes comparison. To address these issues, we propose a novel access policy expression method using 0-1 coding technology. Based on this method, a flexible and efficient CP-WABE is constructed for the IoHT. Our scheme supports not only weighted attributes but also any form of comparison of weighted attributes. Furthermore, we use offline/online encryption and outsourced decryption technology to ensure that the scheme can run on an inefficient IoT terminal. Both theoretical and experimental analyses show that our scheme is more efficient and feasible than other schemes. Moreover, security analysis indicates that our scheme achieves security against a chosen-plaintext attack.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据