4.6 Article

An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JBHI.2021.3075995

关键词

Encryption; Medical services; Security; Access control; Cloud computing; Surgery; Logic gates; 0-1 coding; weighted attribute; ciphertext-policy weighted attribute-based encryption; access policy; Internet of Health Things

资金

  1. National Natural Science Foundation of China [61373163]
  2. Japan Society for the Promotion of Science (JSPS) [JP18K18044, 21K17736]
  3. Grants-in-Aid for Scientific Research [21K17736] Funding Source: KAKEN

向作者/读者索取更多资源

The Internet of Health Things (IoHT) refers to uniquely identifiable devices connected to the Internet that can communicate with each other. This concept plays a crucial role in smart health monitoring and improvement systems, with cybersecurity being a top priority. This article proposes a novel access policy expression method and constructs a flexible and efficient encryption scheme to ensure data security in the IoHT.
The Internet of Health Things (IoHT) is a medical concept that describes uniquely identifiable devices connected to the Internet that can communicate with each other. As one of the most important components of smart health monitoring and improvement systems, the IoHT presents numerous challenges, among which cybersecurity is a priority. As a well-received security solution to achieve fine-grained access control, ciphertext-policy weighted attribute-based encryption (CP-WABE) has the potential to ensure data security in the IoHT. However, many issues remain, such as inflexibility, poor computational capability, and insufficient storage efficiency in attributes comparison. To address these issues, we propose a novel access policy expression method using 0-1 coding technology. Based on this method, a flexible and efficient CP-WABE is constructed for the IoHT. Our scheme supports not only weighted attributes but also any form of comparison of weighted attributes. Furthermore, we use offline/online encryption and outsourced decryption technology to ensure that the scheme can run on an inefficient IoT terminal. Both theoretical and experimental analyses show that our scheme is more efficient and feasible than other schemes. Moreover, security analysis indicates that our scheme achieves security against a chosen-plaintext attack.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据