Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems

Changhee Hahn, Hyunsoo Kwon, Junbeom Hur

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Attribute-based encryption (ABE) offers a promising solution for flexible access control over sensitive personal health records in a mobile healthcare system on top of a public cloud infrastructure. However, ABE cannot be simply applied to lightweight devices due to its substantial computation cost during decryption. This problem could be alleviated by delegating significant parts of the decryption operations to computationally powerful parties such as cloud servers, but the correctness of the delegated computation would be at stake. Thus, previous works enabled users to validate the partial decryption by employing a cryptographic commitment or message authentication code (MAC). This paper demonstrates that the previous commitment or MAC-based schemes cannot support verifiability in the presence of potentially malevolent cloud servers. We propose two concrete attacks on previous commitment or MAC-based schemes. We propose an effective countermeasure scheme for securing resource-limited mobile healthcare systems and provide a rigorous security proof in the standard model, demonstrating that the proposed scheme is secure against our attacks. The experimental analysis shows that the proposed scheme provides the similar performance compared with the previous commitment-based schemes and outperforms the MAC-based scheme.

Original languageEnglish
JournalIEEE Internet of Things Journal
DOIs
Publication statusAccepted/In press - 2018 Jan 1

Keywords

  • attribute-based encryption.
  • Cloud computing
  • cloud computing
  • Cyber-physical systems
  • Encryption
  • Medical diagnostic imaging
  • Medical services
  • mobile healthcare
  • Servers

ASJC Scopus subject areas

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems'. Together they form a unique fingerprint.

  • Cite this