Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 7514867, 15 pages
https://doi.org/10.1155/2017/7514867
Research Article

Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things

School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China

Correspondence should be addressed to Hu Xiong; moc.liamg@ctseu.uhgnoix

Received 27 November 2016; Revised 6 March 2017; Accepted 12 April 2017; Published 28 May 2017

Academic Editor: Tao Han

Copyright © 2017 Zhen Qin et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Su, D. Cao, B. Zhao, X. Wang, and I. You, “EPASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things,” Future Generation Computer Systems, vol. 33, pp. 11–18, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. L. Guo, C. Zhang, J. Sun, and Y. Fang, “A privacy-preserving attribute-based authentication system for mobile health networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 9, pp. 1927–1941, 2014. View at Publisher · View at Google Scholar
  3. J. Zhou, Z. Cao, X. Dong, X. Lin, and A. Vasilakos, “Securing m-healthcare social networks: challenges, countermeasures and future directions,” IEEE Wireless Communications, vol. 20, no. 4, pp. 12–21, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Zhang, X. Liang, R. Lu, and X. Shen, “Sybil attacks and their defenses in the internet of things,” IEEE Internet of Things Journal, vol. 1, no. 5, pp. 372–383, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Perera, C. H. Liu, and S. Jayawardena, “The emerging internet of things marketplace from an industrial perspective: a survey,” IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 4, pp. 585–598, 2015. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Ray, J. Park, and S. Bhunia, “Wearables, implants, and internet of things: the technology needs in the evolving landscape,” IEEE Transactions on Multi-Scale Computing Systems, vol. 2, no. 2, pp. 123–128, 2016. View at Publisher · View at Google Scholar · View at Scopus
  7. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 89–98, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  8. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the IEEE Symposium on Security and Privacy (SP '07), pp. 321–334, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Chen, N. Zhang, Z. Qin et al., “S2M: a lightweight acoustic fingerprints based wireless device authentication protocol,” IEEE Internet of Things Journal, vol. 4, no. 1, pp. 88–100, 2017. View at Publisher · View at Google Scholar
  10. D. Chen, Z. Qin, X. Mao, P. Yang, Z. Qin, and R. Wang, “SmokeGrenade: an efficient key generation protocol with artificial interference,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 11, pp. 1731–1745, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology—EUROCRYPT 2005, vol. 3494 of Lecture Notes in Computer Science, pp. 457–473, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  12. R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-based encryption with non-monotonic access structures,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 195–203, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption,” in Advances in Cryptology---{EUROCRYPT} 2010, vol. 6110 of Lecture Notes in Computer Science, pp. 62–91, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  14. T. Okamoto and K. Takashima, “Fully secure functional encryption with general relations from the decisional linear assumption,” in Advances in Cryptology—{CRYPTO} 2010, vol. 6223 of Lecture Notes in Computer Science, pp. 191–208, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  15. B. Waters, “Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization,” in Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography (PKC '11), vol. 6571 of Lecture Notes in Computer Science, pp. 53–70, Springer, Heidelberg, Germany. View at Publisher · View at Google Scholar · View at MathSciNet
  16. L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 456–465, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. M. Green, S. Hohenberger, and B. Waters, “Outsourcing the decryption of abe ciphertexts,” in Proceedings of the USENIX Security Symposium '11, vol. 2011. View at Publisher · View at Google Scholar
  18. J. Li, X. Y. Huang, J. W. Li, X. F. Chen, and Y. Xiang, “Securely outsourcing attribute-based encryption with checkability,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2201–2210, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. J.-Z. Lai, R. H. Deng, C. Guan, and J. Weng, “Attribute-based encryption with verifiable outsourced decryption,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1343–1354, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. H. Ma, R. Zhang, Z. Wan, Y. Lu, and S. Lin, “Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing,” IEEE Transactions on Dependable and Secure Computing, 2016. View at Publisher · View at Google Scholar
  21. A. Boldyreva, V. Goyal, and V. Kumart, “Identity-based encryption with efficient revocation,” in Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS '08), pp. 417–426, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. S. Rafaeli and D. Hutchison, “A Survey of Key Management for Secure Group Communication,” ACM Computing Surveys, vol. 35, no. 3, pp. 309–329, 2003. View at Publisher · View at Google Scholar · View at Scopus
  23. N. Attrapadung and H. Imai, “Conjunctive broadcast and attribute-based encryption,” in Proceedings of the 3rd International Conference on Pairing-Based Cryptography (Pairing '09), vol. 5671 of Lecture Notes in Computer Science, pp. 248–265, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at MathSciNet
  24. J. Li, W. Yao, Y. Zhang, H. Qian, and J. Han, “Flexible and fine-grained attribute-based data storage in cloud computing,” IEEE Transactions on Services Computing (TSC), 2016. View at Publisher · View at Google Scholar
  25. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security, (ASIACCS '10), pp. 261–270, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Hur, “Improving security and efficiency in attribute-based data sharing,” IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 10, pp. 2271–2282, 2013. View at Publisher · View at Google Scholar · View at Scopus
  27. L. Chen, Z. Cao, R. Lu, X. Liang, and X. Shen, “EPF: An event-aided packet forwarding protocol for privacy-preserving mobile healthcare social networks,” in Proceedings of the 54th Annual IEEE Global Telecommunications Conference: "Energizing Global Communications", vol. 2011, pp. 1–5, usa, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. N. Zhang, N. Lu, N. Cheng, J. W. Mark, and X. S. Shen, “Cooperative spectrum access towards secure information transfer for CRNs,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 11, pp. 2453–2464, 2013. View at Publisher · View at Google Scholar · View at Scopus
  29. J. Zhou, Z. Cao, X. Dong, N. Xiong, and A. V. Vasilakos, “4S: a secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks,” Information Sciences, vol. 314, pp. 255–276, 2015. View at Publisher · View at Google Scholar
  30. S. Jiang, X. Zhu, and L. Wang, “EPPS: efficient and privacy-preserving personal health information sharing in mobile healthcare social networks,” Sensors, vol. 15, no. 9, pp. 22419–22438, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. H. Krawczyk, “Cryptographic extraction and key derivation: the {HKDF} scheme,” in Advances in Cryptology—{CRYPTO} 2010, vol. 6223 of Lecture Notes in Computer Science, pp. 631–648, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  32. H. Xiong, “Cost-effective scalable and anonymous certificateless remote authentication protocol,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 12, pp. 2327–2339, 2014. View at Publisher · View at Google Scholar
  33. H. Xiong and Z. Qin, “Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 7, pp. 1442–1455, 2015. View at Publisher · View at Google Scholar · View at Scopus
  34. N. Zhang, N. Cheng, N. Lu, X. Zhang, J. W. Mark, and X. Shen, “Partner selection and incentive mechanism for physical layer security,” IEEE Transactions on Wireless Communications, vol. 14, no. 8, pp. 4265–4276, 2015. View at Publisher · View at Google Scholar · View at Scopus
  35. K.-A. Shim, Y.-R. Lee, and C.-M. Park, “EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks,” Ad Hoc Networks, vol. 11, no. 1, pp. 182–189, 2013. View at Publisher · View at Google Scholar · View at Scopus
  36. N. Gura, A. Patel, A. Wander et al., “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,” in Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems, vol. 3156 of Lecture Notes in Computer Science, pp. 119–132, Springer, 2004.
  37. B. Lynn, “The stanford pairing based crypto library,” http://crypto.stanford.edu/pbc/.