Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage
نویسندگان
چکیده
In order to save storage space, the data collected from body area networks can be stored in a third party. However, this may bring security problems. The common method is encrypting data before outsourcing. In this paper, we design a role-based access control scheme (RACS) used in the cloud. Firstly, we classify the data which are collected from body area networks into different types, and use the ciphertext-policy attribute-based encryption to encrypt them. Secondly, we divide the ciphertext into two parts, one part is stored in cloud, and the other is in the owner. Different users own different attributes, therefore, they only can access the data when their attributes satisfy the corresponding access structure. The security of medical data is assured in this way. Thirdly, we also add the user revocation to prevent the vicious user from obtaining and modifying the data. Lastly, when the emergency happens, users can obtain the temporary key to access medical data, so as to cure the patients in the first time. We analyze the correctness, security, storage and computation overhead of the scheme. The results show that RACS can resist the ciphertext attack and superior to others in the storage space and computation overhead.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملMulti-Owner Data Sharing in Cloud Storage Using Policy Based Encryption
Cloud storages are generally hosted by third parties where data can be stored and shared. Cloud storage provides virtualized pools of storage and people buy or lease storage capacity from them. The security of data is major problem when people use commercial cloud services to store their data. To avoid unauthorized access, data should be encrypted before outsourcing. Instead of attribute based ...
متن کاملUser Revocation Based Anonymous Access Provision for Efficient Cloud User Privacy
Cloud computing is a recent technology provides a flexible, on-demand and low cost feature of computing resources. The Main issue in Cloud Computing is user identity privacy and data content privacy. The User Privacy in Cloud Computing is achieved by various data access control Schemes. Existing Fully Anonymous Access control scheme with decentralized attribute authority provides data content p...
متن کاملA Survey on Attribute Based Encryption Scheme in Cloud Computing
Cloud computing, is an emerging computing paradigm, enabling users to remotely store their data in a server and provide services on-demand. In cloud computing cloud users and cloud service providers are almost certain to be from different trust domains. Data security and privacy are the critical issues for remote data storage. A secure user enforced data access control mechanism must be provide...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 19 شماره
صفحات -
تاریخ انتشار 2017