Cargando…
EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy
As medical data become increasingly important in healthcare, it is crucial to have proper access control mechanisms, ensuring that sensitive data are only accessible to authorized users while maintaining privacy and security. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an attractive acc...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10181541/ https://www.ncbi.nlm.nih.gov/pubmed/37177587 http://dx.doi.org/10.3390/s23094384 |
_version_ | 1785041598842667008 |
---|---|
author | Ma, Haobin Zhou, Dehua Li, Peng Wang, Xiaoming |
author_facet | Ma, Haobin Zhou, Dehua Li, Peng Wang, Xiaoming |
author_sort | Ma, Haobin |
collection | PubMed |
description | As medical data become increasingly important in healthcare, it is crucial to have proper access control mechanisms, ensuring that sensitive data are only accessible to authorized users while maintaining privacy and security. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an attractive access control solution that can offer effective, fine-grained and secure medical data sharing, but it has two major drawbacks: Firstly, decryption is computationally expensive for resource-limited data users, especially when the access policy has many attributes, limiting its use in large-scale data-sharing scenarios. Secondly, existing schemes are based on data users’ attributes, which can potentially reveal sensitive information about the users, especially in healthcare data sharing, where strong privacy and security are essential. To address these issues, we designed an improved CP-ABE scheme that provides efficient and verifiable outsourced access control with fully hidden policy named EVOAC-HP. In this paper, we utilize the attribute bloom filter to achieve policy hiding without revealing user privacy. For the purpose of alleviating the decryption burden for data users, we also adopt the technique of outsourced decryption to outsource the heavy computation overhead to the cloud service provider (CSP) with strong computing and storage capabilities, while the transformed ciphertext results can be verified by the data user. Finally, with rigorous security and reliable performance analysis, we demonstrate that EVOAC-HP is both practical and effective with robust privacy protection. |
format | Online Article Text |
id | pubmed-10181541 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-101815412023-05-13 EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy Ma, Haobin Zhou, Dehua Li, Peng Wang, Xiaoming Sensors (Basel) Article As medical data become increasingly important in healthcare, it is crucial to have proper access control mechanisms, ensuring that sensitive data are only accessible to authorized users while maintaining privacy and security. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an attractive access control solution that can offer effective, fine-grained and secure medical data sharing, but it has two major drawbacks: Firstly, decryption is computationally expensive for resource-limited data users, especially when the access policy has many attributes, limiting its use in large-scale data-sharing scenarios. Secondly, existing schemes are based on data users’ attributes, which can potentially reveal sensitive information about the users, especially in healthcare data sharing, where strong privacy and security are essential. To address these issues, we designed an improved CP-ABE scheme that provides efficient and verifiable outsourced access control with fully hidden policy named EVOAC-HP. In this paper, we utilize the attribute bloom filter to achieve policy hiding without revealing user privacy. For the purpose of alleviating the decryption burden for data users, we also adopt the technique of outsourced decryption to outsource the heavy computation overhead to the cloud service provider (CSP) with strong computing and storage capabilities, while the transformed ciphertext results can be verified by the data user. Finally, with rigorous security and reliable performance analysis, we demonstrate that EVOAC-HP is both practical and effective with robust privacy protection. MDPI 2023-04-28 /pmc/articles/PMC10181541/ /pubmed/37177587 http://dx.doi.org/10.3390/s23094384 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Ma, Haobin Zhou, Dehua Li, Peng Wang, Xiaoming EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy |
title | EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy |
title_full | EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy |
title_fullStr | EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy |
title_full_unstemmed | EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy |
title_short | EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy |
title_sort | evoac-hp: an efficient and verifiable outsourced access control scheme with hidden policy |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10181541/ https://www.ncbi.nlm.nih.gov/pubmed/37177587 http://dx.doi.org/10.3390/s23094384 |
work_keys_str_mv | AT mahaobin evoachpanefficientandverifiableoutsourcedaccesscontrolschemewithhiddenpolicy AT zhoudehua evoachpanefficientandverifiableoutsourcedaccesscontrolschemewithhiddenpolicy AT lipeng evoachpanefficientandverifiableoutsourcedaccesscontrolschemewithhiddenpolicy AT wangxiaoming evoachpanefficientandverifiableoutsourcedaccesscontrolschemewithhiddenpolicy |