z-logo
open-access-imgOpen Access
CESCR: CP-ABE for efficient and secure sharing of data in collaborative ehealth with revocation and no dummy attribute
Author(s) -
Kennedy Edemacu,
Beakcheol Jang,
Jong Wook Kim
Publication year - 2021
Publication title -
plos one
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.99
H-Index - 332
ISSN - 1932-6203
DOI - 10.1371/journal.pone.0250992
Subject(s) - revocation , computer science , attribute based encryption , ciphertext , encryption , ehealth , computer security , data sharing , cloud computing , access structure , scheme (mathematics) , cryptography , health care , secret sharing , public key cryptography , mathematics , medicine , mathematical analysis , alternative medicine , pathology , economics , overhead (engineering) , economic growth , operating system
With the rapid advancement of information and communication technologies, there is a growing transformation of healthcare systems. A patient’s health data can now be centrally stored in the cloud and be shared with multiple healthcare stakeholders, enabling the patient to be collaboratively treated by more than one healthcare institution. However, several issues, including data security and privacy concerns still remain unresolved. Ciphertext-policy attribute-based encryption (CP-ABE) has shown promising potential in providing data security and privacy in cloud-based systems. Nevertheless, the conventional CP-ABE scheme is inadequate for direct adoption in a collaborative ehealth system. For one, its expressiveness is limited as it is based on a monotonic access structure. Second, it lacks an attribute/user revocation mechanism. Third, the computational burden on both the data owner and data users is linear with the number of attributes in the ciphertext. To address these inadequacies, we propose CESCR, a CP-ABE for efficient and secure sharing of health data in collaborative ehealth systems with immediate and efficient attribute/user revocation. The CESCR scheme is unbounded, i.e., it does not bind the size of the attribute universe to the security parameter, it is based on the expressive and non-restrictive ordered binary decision diagram (OBDD) access structure, and it securely outsources the computationally demanding attribute operations of both encryption and decryption processes without requiring a dummy attribute. Security analysis shows that the CESCR scheme is secure in the selective model. Simulation and performance comparisons with related schemes also demonstrate that the CESCR scheme is expressive and efficient.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here