Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Securing E-health Data using Ciphertext-Policy Attribute-Based Encryption with Dynamic User Revocation

View through CrossRef
E-health systems hold a massive amount of medical data that is stored and shared across healthcare service providers to deliver health facilities. However, security and privacy worries increase when sharing this data over distributed settings. As a result, Cryptography techniques have been considered to secure e-health data from unauthorized access. The Ciphertext Policy Attribute-Based Encryption (CP-ABE) is commonly utilized in such a setting, which provides role-based and fine-grained access control over encrypted data. The CP-ABE suffers from the problem of user revocation where the entire policy must be changed even when only one user is revoked or removed from the policy. In this paper, we proposed a CP-ABE based access control model to support user revocation efficiently. Specifically, the proposed model associates a unique identifier to each user. This identifier is added to the policy attributes and removed dynamically when the user is added/revoked. A tree structure (PolicyPathTree) is designed specifically for our model. It can facilitate fast access to policy's attributes during the verification process; The model is analyzed using Information Theory Tools. Results show that our model outperforms other notable work in terms of computational overheads.,
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Title: Securing E-health Data using Ciphertext-Policy Attribute-Based Encryption with Dynamic User Revocation
Description:
E-health systems hold a massive amount of medical data that is stored and shared across healthcare service providers to deliver health facilities.
However, security and privacy worries increase when sharing this data over distributed settings.
As a result, Cryptography techniques have been considered to secure e-health data from unauthorized access.
The Ciphertext Policy Attribute-Based Encryption (CP-ABE) is commonly utilized in such a setting, which provides role-based and fine-grained access control over encrypted data.
The CP-ABE suffers from the problem of user revocation where the entire policy must be changed even when only one user is revoked or removed from the policy.
In this paper, we proposed a CP-ABE based access control model to support user revocation efficiently.
Specifically, the proposed model associates a unique identifier to each user.
This identifier is added to the policy attributes and removed dynamically when the user is added/revoked.
A tree structure (PolicyPathTree) is designed specifically for our model.
It can facilitate fast access to policy's attributes during the verification process; The model is analyzed using Information Theory Tools.
Results show that our model outperforms other notable work in terms of computational overheads.
,.

Related Results

Research on Ciphertext‐Policy Attribute‐Based Encryption with Attribute Level User Revocation in Cloud Storage
Research on Ciphertext‐Policy Attribute‐Based Encryption with Attribute Level User Revocation in Cloud Storage
Attribute‐based encryption (ABE) scheme is more and more widely used in the cloud storage, which can achieve fine‐grained access control. However, it is an important challenge to s...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
ACKNOWLEDGMENTS
ACKNOWLEDGMENTS
The UP Manila Health Policy Development Hub recognizes the invaluable contribution of the participants in theseries of roundtable discussions listed below: RTD: Beyond Hospit...
An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints
An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints
Secure Data sharing is a major issue of concern in cloud computing. CPABE is well known encryption technique for dealing with the problem of data security over network. Most of the...
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
As a method for providing security of the messages sent via a public channel in the case of potential coercive attacks there had been proposed algorithms and protocols of deniable ...
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
Abstract We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally...
Design on Face Recognition System with Privacy Preservation Based on Homomorphic Encryption
Design on Face Recognition System with Privacy Preservation Based on Homomorphic Encryption
Abstract Face recognition is playing an increasingly important role in present society, and suffers from the privacy leakage in plaintext. Therefore, a recognition system b...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...

Back to Top