Augmented security scheme for shared dynamic data with efficient lightweight elliptic curve cryptography
DOI:
https://doi.org/10.20535/SRIT.2308-8893.2023.3.02Keywords:
ciphertext, user revocation, data sharing, CC, ECC, security issuesAbstract
Technology for Cloud Computing (CC) has advanced, so Cloud Computing creates a variety of cloud services. Users may receive storage space from the provider as Cloud storage services are quite practical; many users and businesses save their data in cloud storage. Data confidentiality becomes a larger risk for service providers when more information is outsourced to Cloud storage. Hence in this work, a Ciphertext and Elliptic Curve Cryptography (ECC) with Identity-based encryption (CP-IBE) approaches are used in the cloud environment to ensure data security for a healthcare environment. The revocation problem becomes complicated since characteristics are used to create cipher texts and secret keys; therefore, a User revocation algorithm is introduced for which a secret token key is uniquely produced for each level ensuring security. The initial operation, including signature, public audits, and dynamic data, are sensible to Sybil attacks; hence, to overcome that, a Sybil Attack Check Algorithm is introduced, effectively securing the system. Moreover, the conditions for public auditing using shared data and providing typical strategies, including the analytical function, security, and performance conditions, are analyzed in terms of accuracy, sensitivity, and similarity.
References
Remya Sivan and Zuriati Ahmad Zukarnain, “Security and privacy in cloud-based e-health system,” Symmetry, vol. 13, no. 5, pp. 742, 2021.
Umar Zaman et al., “Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications,” Electronics, vol. 11, no. 12, pp. 1893, 2022.
Tuan Minh Nguyen Dang, Nhan Nguyen Thanh, and Loc Le Tuan, “Applying a mindfulness-based reliability strategy to the Internet of Things in healthcare–A business model in the Vietnamese market,” Technological Forecasting and Social Change, vol. 140, pp. 54–68, 2019.
Kavita Jaiswal and Anand Veena, “A survey on IoT-based healthcare system: potential applications, issues, and challenges,” Advances in Biomedical Engineering and Technology. Springer, Singapore, pp. 459–471, 2021.
Ying Jin et al., “Identifying human body states by using a flexible integrated sensor,” npj Flexible Electronics, vol. 4, no. 1, pp. 1–8, 2020.
L. Minh Dang et al., “A survey on internet of things and cloud computing for healthcare,” Electronics, vol. 8, no. 7, pp. 768, 2019.
Sherali Zeadally et al., “Smart healthcare: Challenges and potential solutions using internet of things (IoT) and big data analytics,” PSU research review, 2019.
Shahidinejad Ali, Mostafa Ghobaei-Arani, and Mohammad Masdari, “Resource provisioning using workload clustering in cloud computing environment: a hybrid approach,” Cluster Computing, vol. 24, no. 1, pp. 319–342, 2021.
M. Saleh Altowaijri, “An architecture to improve the security of cloud computing in the healthcare sector,” Smart Infrastructure and Applications. Springer, Cham, pp. 249–266, 2020.
L. Pallavi, A. Jagan, and B. Thirumala Rao, “Mobility Management Challenges and Solutions in Mobile Cloud Computing System for Next Generation Networks,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 3, 2020.
Li Xiaoqing et al., “Building the Internet of Things platform for smart maternal healthcare services with wearable devices and cloud computing,” Future Generation Computer Systems, vol. 118, pp. 282–296, 2021.
G. Lavanya et al., IoT Enabled Assisting Device for Seizures Monitoring. 2019, pp. 10–14.
M. Anuradha et al., “IoT enabled cancer prediction system to enhance the authentication and security using cloud computing,” Microprocessors and Microsystems, vol. 80, pp. 103301, 2021.
Thilakarathne Navod Neranjan, Mohan Krishna Kagita, and Thippa Reddy Gadekallu, “The role of the internet of things in health care: a systematic and comprehensive study,” Available at SSRN, pp. 3690815, 2020.
Mehrotra Preeti, Preeti Malani, and Prashant Yadav, “Personal protective equipment shortages during COVID-19—supply chain–related causes and mitigation strategies,” JAMA Health Forum, vol. 1, no. 5, 2020.
Verma Deepak Kumar and Tanya Sharma, “Issues and challenges in cloud computing,” Int. J. Adv. Res. Comput. Commun. Eng., vol. 8, pp. 188–195, 2019.
Siyal Asad Ali et al., “Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives,” Cryptography, vol. 3, no. 1, pp. 3, 2019.
Kumar Y. Kiran and R. Mahammad Shafi, “An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem,” International Journal of Electrical and Computer Engineering, vol. 10, no. 1, pp. 530, 2020.
Hans-Georg Eichler et al., “Data rich, information poor: can we use electronic health records to create a learning healthcare system for pharmaceuticals?,” Clinical Pharmacology & Therapeutics, vol. 105, no. 4, pp. 912–922, 2019.
Yan Shengguang et al., “Concurrent healthcare data processing and storage framework using deep-learning in distributed cloud computing environment,” IEEE Transactions on Industrial Informatics, vol. 17, no. 4, pp. 2794–2801, 2020.
Hao Meng et al., “Privacy-aware and resource-saving collaborative learning for healthcare in cloud computing,” ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 2020.
Yudi Zhang et al., “Efficient identity-based distributed decryption scheme for electronic personal health record sharing system,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 2, pp. 384–395, 2020.
Akhilendra Pratap Singh et al., “A novel patient-centric architectural framework for blockchain-enabled healthcare applications,” IEEE Transactions on Industrial Informatics, vol. 17, no. 8, pp. 5779–5789, 2020.
Xu Yang et al., “Efficient and anonymous authentication for healthcare service with cloud based WBANs,” IEEE Transactions on Services Computing, 2021.
Seunghwan Son et al., “Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain,” IEEE Access, vol. 8, pp. 192177–192191, 2020.
Wenhai Sun et al., “Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 4, pp. 1187–1198, 2014.
Kaitai Liang and Susilo Willy, “Searchable attribute-based mechanism with efficient data sharing for secure cloud storage,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1981–1992.
Jianting Ning et al., “White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp. 1274–1288, 2015.
Liu Zhen, Zhenfu Cao, and S. Duncan Wong, “White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 76–88, 2012.
Yang Yang, et al., “Lightweight sharable and traceable secure mobile health system,” IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 1, pp. 78–91, 2017.
Q. Zhang, Q. Liu, and G. Wang, “PRMS: A personalized mobile search over encrypted outsourced data,” IEEE Access, 6, pp. 31541–31552, 2018.