Cargando…

EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy

As medical data become increasingly important in healthcare, it is crucial to have proper access control mechanisms, ensuring that sensitive data are only accessible to authorized users while maintaining privacy and security. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an attractive acc...

Descripción completa

Detalles Bibliográficos
Autores principales: Ma, Haobin, Zhou, Dehua, Li, Peng, Wang, Xiaoming
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10181541/
https://www.ncbi.nlm.nih.gov/pubmed/37177587
http://dx.doi.org/10.3390/s23094384
_version_ 1785041598842667008
author Ma, Haobin
Zhou, Dehua
Li, Peng
Wang, Xiaoming
author_facet Ma, Haobin
Zhou, Dehua
Li, Peng
Wang, Xiaoming
author_sort Ma, Haobin
collection PubMed
description As medical data become increasingly important in healthcare, it is crucial to have proper access control mechanisms, ensuring that sensitive data are only accessible to authorized users while maintaining privacy and security. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an attractive access control solution that can offer effective, fine-grained and secure medical data sharing, but it has two major drawbacks: Firstly, decryption is computationally expensive for resource-limited data users, especially when the access policy has many attributes, limiting its use in large-scale data-sharing scenarios. Secondly, existing schemes are based on data users’ attributes, which can potentially reveal sensitive information about the users, especially in healthcare data sharing, where strong privacy and security are essential. To address these issues, we designed an improved CP-ABE scheme that provides efficient and verifiable outsourced access control with fully hidden policy named EVOAC-HP. In this paper, we utilize the attribute bloom filter to achieve policy hiding without revealing user privacy. For the purpose of alleviating the decryption burden for data users, we also adopt the technique of outsourced decryption to outsource the heavy computation overhead to the cloud service provider (CSP) with strong computing and storage capabilities, while the transformed ciphertext results can be verified by the data user. Finally, with rigorous security and reliable performance analysis, we demonstrate that EVOAC-HP is both practical and effective with robust privacy protection.
format Online
Article
Text
id pubmed-10181541
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-101815412023-05-13 EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy Ma, Haobin Zhou, Dehua Li, Peng Wang, Xiaoming Sensors (Basel) Article As medical data become increasingly important in healthcare, it is crucial to have proper access control mechanisms, ensuring that sensitive data are only accessible to authorized users while maintaining privacy and security. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an attractive access control solution that can offer effective, fine-grained and secure medical data sharing, but it has two major drawbacks: Firstly, decryption is computationally expensive for resource-limited data users, especially when the access policy has many attributes, limiting its use in large-scale data-sharing scenarios. Secondly, existing schemes are based on data users’ attributes, which can potentially reveal sensitive information about the users, especially in healthcare data sharing, where strong privacy and security are essential. To address these issues, we designed an improved CP-ABE scheme that provides efficient and verifiable outsourced access control with fully hidden policy named EVOAC-HP. In this paper, we utilize the attribute bloom filter to achieve policy hiding without revealing user privacy. For the purpose of alleviating the decryption burden for data users, we also adopt the technique of outsourced decryption to outsource the heavy computation overhead to the cloud service provider (CSP) with strong computing and storage capabilities, while the transformed ciphertext results can be verified by the data user. Finally, with rigorous security and reliable performance analysis, we demonstrate that EVOAC-HP is both practical and effective with robust privacy protection. MDPI 2023-04-28 /pmc/articles/PMC10181541/ /pubmed/37177587 http://dx.doi.org/10.3390/s23094384 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ma, Haobin
Zhou, Dehua
Li, Peng
Wang, Xiaoming
EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy
title EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy
title_full EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy
title_fullStr EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy
title_full_unstemmed EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy
title_short EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy
title_sort evoac-hp: an efficient and verifiable outsourced access control scheme with hidden policy
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10181541/
https://www.ncbi.nlm.nih.gov/pubmed/37177587
http://dx.doi.org/10.3390/s23094384
work_keys_str_mv AT mahaobin evoachpanefficientandverifiableoutsourcedaccesscontrolschemewithhiddenpolicy
AT zhoudehua evoachpanefficientandverifiableoutsourcedaccesscontrolschemewithhiddenpolicy
AT lipeng evoachpanefficientandverifiableoutsourcedaccesscontrolschemewithhiddenpolicy
AT wangxiaoming evoachpanefficientandverifiableoutsourcedaccesscontrolschemewithhiddenpolicy