Visible to the public O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System

TitleO3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System
Publication TypeJournal Article
Year of Publication2021
AuthorsGuo, Rui, Yang, Geng, Shi, Huixian, Zhang, Yinghui, Zheng, Dong
JournalIEEE Internet of Things Journal
Volume8
Pagination8949–8963
Date Publishedjun
ISSN2327-4662
KeywordsChameleon hash function, cloud computing, cloud-assisted Internet of Medical Things (IoMT), CP-ABE, Ecosystems, Encryption, Internet of Things, Medical services, online/offline attribute-based encryption (ABE), outsourced decryption, policy-based governance, pubcrawl, revocation, Scalability, Servers, Telecommunications
AbstractWith the processes of collecting, analyzing, and transmitting the data in the Internet of Things (IoT), the Internet of Medical Things (IoMT) comprises the medical equipment and applications connected to the healthcare system and offers an entity with real time, remote measurement, and analysis of healthcare data. However, the IoMT ecosystem deals with some great challenges in terms of security, such as privacy leaking, eavesdropping, unauthorized access, delayed detection of life-threatening episodes, and so forth. All these negative effects seriously impede the implementation of the IoMT ecosystem. To overcome these obstacles, this article presents an efficient, outsourced online/offline revocable ciphertext policy attribute-based encryption scheme with the aid of cloud servers and blockchains in the IoMT ecosystem. Our proposal achieves the characteristics of fine-grained access control, fast encryption, outsourced decryption, user revocation, and ciphertext verification. It is noteworthy that based on the chameleon hash function, we construct the private key of the data user with collision resistance, semantically secure, and key-exposure free to achieve revocation. To the best of our knowledge, this is the first protocol for a revocation mechanism by means of the chameleon hash function. Through formal analysis, it is proven to be secure in a selectively replayable chosen-ciphertext attack (RCCA) game. Finally, this scheme is implemented with the Java pairing-based cryptography library, and the simulation results demonstrate that it enables high efficiency and practicality, as well as strong reliability for the IoMT ecosystem.
NotesConference Name: IEEE Internet of Things Journal
DOI10.1109/JIOT.2021.3055541
Citation Keyguo_o3-r-cp-abe_2021