Abstract

Secure patient health record (PHR) information exchange via cloud computing is a considerable security risk to user privacy. The fundamental reason of this issue is cloud computing’s reliance on trustworthy third parties to share data across it. To exchange data securely, many conventional cryptographic algorithms employ various keying approaches. However, relying on a trusted third party compromises the privacy of consumers’ data. To offer secure communication without the involvement of a third party, a distributed blockchain based (DBC) ciphertext–policy attribute-based encryption (CP-ABE) approach is employed in this study. Because of bilinear paring and simple scalar multiplication factors, the proposed CP-ABE system is entirely dependent on elliptic curve cryptography to reduce complexity. Furthermore, the data requester provides dynamic attributes, and a user-centric access policy is created, allowing multiple authorities to manage the attributes and provide data access. Data confidentiality, data authentication, user authentication, and tamper-proof data are all guaranteed by the suggested method. The DBC-CP-ABE method is used to provide user-centric access policies and effective key management.

Highlights

  • Introduction eInternet of ings (IoT) is a new technology that allows items to communicate with one another across wireless networks

  • Less complex and less resource consumption scalar computation with elliptic curve cryptography (ECC) is used in this work. is reduces the computational requirement by two-three times that of bilinear pairing. is work focuses on building a security system with blockchain where hierarchical access control policy is achieved by combining ciphertext–policy attribute-based encryption (CP-attribute-based encryption (ABE)) and ECC. e experiment analysis shows that our scheme outperforms the compared work in cryptographic operations. e major focus of this work is concentrated to achieve the following criteria: Security and Communication Networks

  • We suggested a blockchain based hierarchical access scheme that uses CP-ABE with ECC in this paper

Read more

Summary

Related Works

Cloud computing offers computation of massive data and data sharing in a promising way [1]. A bilinear map produces secret keys of larger values and ciphertext with linear associated attribute It uses exponentiation factors for doing encryption and decryption process which relies on linear attributes defined in the access policy [15–17]. Lightweight devices such as the CP-ABE with constant key size using ECC have been developed, but they are not appropriate for complex access structures [21, 22] Another lightweight work using KP-ABE without bilinear pairing is proposed but suffers from poor scalability and lack of decryption outsourcing [23]. Many studies have refined the use of CP-ABE with flat access control [29–33], constant ciphertext [34], accountability and authorities with attribute revocation [35–38], and improvement in security through accountability and authorities None of these structures support hierarchical file relationships. Using edge computing and blockchain approaches, [48] introduces search efficiency, reliability requirements, and a resource allocation scheme to properly handle IoT devices. e study [49] demonstrates how to use erasure coding to overcome data integrity issues in IoT devices

Our Contribution
Elliptic
Hierarchical Access Control Strategies
Select H
Attribute Authority (1) User creation (2)
Data Clients (1)
Security under Chosen
Unauthorized Communication
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call