| Literature DB >> 34065312 |
Fawad Khan1, Saad Khan2, Shahzaib Tahir1, Jawad Ahmad3, Hasan Tahir1, Syed Aziz Shah4.
Abstract
Healthcare is a multi-actor environment that requires independent actors to have a different view of the same data, hence leading to different access rights. Ciphertext Policy-Attribute-based Encryption (CP-ABE) provides a one-to-many access control mechanism by defining an attribute's policy over ciphertext. Although, all users satisfying the policy are given access to the same data, this limits its usage in the provision of hierarchical access control and in situations where different users/actors need to have granular access of the data. Moreover, most of the existing CP-ABE schemes either provide static access control or in certain cases the policy update is computationally intensive involving all non-revoked users to actively participate. Aiming to tackle both the challenges, this paper proposes a patient-centric multi message CP-ABE scheme with efficient policy update. Firstly, a general overview of the system architecture implementing the proposed access control mechanism is presented. Thereafter, for enforcing access control a concrete cryptographic construction is proposed and implemented/tested over the physiological data gathered from a healthcare sensor: shimmer sensor. The experiment results reveal that the proposed construction has constant computational cost in both encryption and decryption operations and generates constant size ciphertext for both the original policy and its update parameters. Moreover, the scheme is proven to be selectively secure in the random oracle model under the q-Bilinear Diffie Hellman Exponent (q-BDHE) assumption. Performance analysis of the scheme depicts promising results for practical real-world healthcare applications.Entities:
Keywords: constant computations; constant size ciphertext; hierarchal; multi message; policy update
Mesh:
Year: 2021 PMID: 34065312 PMCID: PMC8161120 DOI: 10.3390/s21103556
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Applications of CP-ABE schemes in Healthcare.
| Scheme | AA | Security | Feature | PU |
|---|---|---|---|---|
| [ | Single | SS-SM under decisional q parallel BDHE | online-offline encryption for resource constrained client | No |
| [ | Single | FS-SM under 3 assumptions in composite order group | doctor centric key delegation decryption mechanism | No |
| [ | Single | SS-SM under decisional q parallel BDHE, c-BDHE | online-offline attribute based proxy re-encryption | No |
| [ | Single | FS-GGM | searchable trapdoor CP-ABE | No |
| [ | Single | N/A | searchable trapdoor CP-ABE | No |
| This Work | Multiple | SS-ROM under q-BDHE | patient-centric CP-ABE with policy update & const costs | Yes |
SS: Selective Secure, FS: Fully Secure, SM: Standard Model, GGM: Generic Group Model, BDHE: Bilinear Diffie Hellman Exponent Assumption, PU: Policy Update Feature of CP-ABE, ROM: Random Oracle Model.
Figure 1System Model of PC-MM-CP-ABE-EPU.
Figure 2Flow Diagram of Access Control Actions.
Notations.
| Symbol | Description |
|---|---|
|
| Bilinear group order |
|
| Maximum number of attribute sets |
|
| A particular attribute set of policy |
|
| Number of attributes within an attribute set |
|
| Total number of attributes in the access structure |
|
| Ciphertext Policy comprising of several |
|
| User attribute set consisting of various attributes |
|
| User attribute set satisfying policy |
|
| User attribute set not satisfying policy |
|
| Attributes for policy update |
|
| Updated Policy |
|
| Global Identifier |
|
| Owner secret |
|
| Policy update parameter |
|
| Indistinguishability under selective CPA |
Users satisfying policy and access type (Partial/Full).
|
| User Attribute Set |
|
| DA |
|---|---|---|---|---|
| 1 | Doctor, Hospital-1, Clinic-X | Yes | Yes | F |
| 2 | Nurse, Hospital-2 | No | No | P |
| 3 | Professor, University-1, University-2 | Yes | Yes | F |
| 4 | Insurance-comp-1, Insurance-agent | Yes | No | F |
| 5 | Student, University-1 | Yes | No | P |
U: User, DA: Data Access, P: Partial, F: Full.
Computational Costs Comparison with existing relevant schemes.
| Scheme | Encryption | Decryption | Ciphertext Size |
|---|---|---|---|
| [ |
|
|
|
| [ |
|
|
|
| [ |
|
|
|
| [ |
|
|
|
| [ |
|
|
|
| [ |
|
|
|
| This Work |
|
|
|
n: number of attributes in access structure, z: users attributes satisfying policy, : number of attribute sets in policy, E: Exponentiation, P: Pairing, G: Source group, i.e., g, : Target group, i.e., e(g,g), K: depth of attribute vector.
Comparison of schemes based on policy update.
| Scheme | Encryption | Decryption | Ciphertext | Policy Update | Ciphertext Update |
|---|---|---|---|---|---|
| [ |
|
|
|
|
|
| [ |
|
|
|
|
|
| [ |
|
|
|
|
|
| This Work |
|
|
|
|
|
E: Exponentiation, P: Pairing, G: Source group, i.e., g, : Target group, i.e., e(g,g), r: max number of revocated attributes, u: number of attributes in universe, n: number of attributes in access structure, t: number of revocated attributes from ciphertext.
Shimmer Sensor Specification.
| Source | Sampling Rate |
|---|---|
| Gyroscope | 512 Hz |
| ECG | 1024 Hz |
| EMG | 512 Hz |
| GSR | 128 Hz |
| Optical Pulse PPG | 128 Hz |
Figure 3Patient Policy Encryption Time (ms) for # of attributes.
Figure 4Contextual User’s Conforming Policy for data access.
Figure 5Attributes addition by patient for policy update.
Figure 6Attributes revocation by patient for policy update.
Realtime Sensor’s Data Encryption.
| Source | Encryption (ms) | Decryption (ms) | Ciphertext (bytes) |
|---|---|---|---|
| GSR | 0.19 | 0.10 | 1813 |
| Gyroscope | 0.27 | 0.19 | 23,541 |
| ECG | 0.68 | 0.48 | 63,797 |