| Literature DB >> 33974672 |
Kennedy Edemacu1, Beakcheol Jang2, Jong Wook Kim1.
Abstract
With the rapid advancement of information and communication technologies, there is a growing transformation of healthcare systems. A patient's health data can now be centrally stored in the cloud and be shared with multiple healthcare stakeholders, enabling the patient to be collaboratively treated by more than one healthcare institution. However, several issues, including data security and privacy concerns still remain unresolved. Ciphertext-policy attribute-based encryption (CP-ABE) has shown promising potential in providing data security and privacy in cloud-based systems. Nevertheless, the conventional CP-ABE scheme is inadequate for direct adoption in a collaborative ehealth system. For one, its expressiveness is limited as it is based on a monotonic access structure. Second, it lacks an attribute/user revocation mechanism. Third, the computational burden on both the data owner and data users is linear with the number of attributes in the ciphertext. To address these inadequacies, we propose CESCR, a CP-ABE for efficient and secure sharing of health data in collaborative ehealth systems with immediate and efficient attribute/user revocation. The CESCR scheme is unbounded, i.e., it does not bind the size of the attribute universe to the security parameter, it is based on the expressive and non-restrictive ordered binary decision diagram (OBDD) access structure, and it securely outsources the computationally demanding attribute operations of both encryption and decryption processes without requiring a dummy attribute. Security analysis shows that the CESCR scheme is secure in the selective model. Simulation and performance comparisons with related schemes also demonstrate that the CESCR scheme is expressive and efficient.Entities:
Year: 2021 PMID: 33974672 PMCID: PMC8112809 DOI: 10.1371/journal.pone.0250992
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1An OBDD access structure depicting the f(a0, a1, a2) = a0.a1 + a0.a2 + a1.a2 access formula with variable ordering as: a0 < a1 < a2.
The solid arrows represent the edges leading to the nodes’ high(v) child nodes and the dotted arrows represent the edges leading to the nodes’ low(v) child nodes.
Fig 2An architecture of our scheme depicting the entities involved.
Fig 3A binary tree to manage attribute group members.
Feature and storage comparison of CP-ABE schemes.
| Schemes | ||||||
|---|---|---|---|---|---|---|
| [ | [ | [ | [ | [ | CESCR | |
| Key size | | | 2| | 2 | 3| | 2 | 3| |
| Ciphertext size | 3| | 3| | 2 + | | 2| | 2 + | | | |
| Unbounded | ✔ | ✔ | × | ✔ | × | ✔ |
| Revocation | × | ✔ | × | ✔ | × | ✔ |
| Coll-Resist | ✔ | × | ✔ | ✔ | ✔ | ✔ |
| Encryption | DO | DO | DO | Par-out | DO | Par-out |
| Decryption | DU | DU | DU | Par-out | DU | Par-out |
| Expressiveness | LSSS | Access tree | OBDD | Access tree | OBDD | OBDD |
| Group Order | Composite | Prime | Prime | Prime | Prime | Prime |
*|pk| is path key size, Coll-Resist is collusion resistance, Par-out is partially outsourced, DO is data owner, DU is data user.
Computation comparison of CP-ABE schemes.
| Schemes | ||||||||
|---|---|---|---|---|---|---|---|---|
| [ | [ | [ | [ | [ | CESCR | |||
| Encryption Cost | Mult | DO | 11| | 1 | | | 2 | | | 1 |
| Cloud | n/a | | | n/a | n/a | n/a | | | ||
| Expo | DO | 7| | 2| | | | 6 | | | 3 | |
| Cloud | n/a | | | n/a | 2| | n/a | n/a | ||
| Pair | DO | n/a | n/a | n/a | 2 | n/a | n/a | |
| Decryption Cost | Mult | DU | 4| | ≥| | 2 | 4 | 2 | 1 |
| Cloud | n/a | n/a | n/a | ≥| | n/a | 2| | ||
| Expo | DU | 3| | 1 | n/a | 4 | n/a | 4 | |
| Pair | DU | 2| | ≥2| | 2 | n/a | 2 | n/a | |
| Cloud | n/a | n/a | n/a | ≥2| | n/a | 3| | ||
| Key Gen Cost | Mult | 2| | | | 1 | 4| | 1 | | | |
| Expo | 2| | 3| | 2 | 4| | 2 | 4| | ||
| Pair | n/a | n/a | n/a | 1 | n/a | n/a | ||
*Multi, Expo and Pair represent the multiplication, exponentiation and pairing operations, respectively. DO is data owner and DU is data user.
Fig 4Simulation results of the CESCR scheme in comparison with the LZQH [25] and H-N [24] schemes.