Skip to main content

Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare

  • Conference paper
  • First Online:
Information Security Practice and Experience (ISPEC 2018)

Abstract

To solve doctor’s service bottlenecks under the peak condition of mobile medical, the paper proposes utilizing authorized agents to provide service, so as to reduce the burden of doctors and enhance the flexibility of service as well. We use attribute encryption technology to encrypt medical data, the ciphertext can be decrypted correctly when the proxy attribute satisfies the policy set by the authorized user, so as to obtain proxy signature to provide medical service for medical users. The scheme not only can alleviate the burden on the mobile medical service providers in the peak of the bottleneck, but also can solve the authorization problem during the absence of doctors. At the same time, we can achieve proxy traceback to preform the agency accountability and to avoid unauthorized agency audit. This scheme can be used to reduce the computing cost of authorized doctors by using trusted authorization center. The simulation results reveal that the performance can be improved significantly than other scheme.

This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009 and 61472451, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006 and High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01; The Hunan Provincial Natural Science Foundation of China (2015JJ3046, 2018JJ2147); The Hunan Provincal Science and Technology Key Development Project 2017NK2390. Key Construction of Computer Application Technology, Hunan University of Science and Engineering (128030219-001).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lu, Z., Chen, X., Dong, Z.: A prototype of reflection pulse oximeter designed for mobile healthcare. IEEE J. Biomed. Health Inform. 20(5), 1 (2015)

    Google Scholar 

  2. Zhang, K., Yang, K., Liang, X.: Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wirel. Commun. 22(4), 104–112 (2015)

    Article  Google Scholar 

  3. Ren, Y., Chen, Y., Chuah, M.C.: User verification leveraging gait recognition for smartphone enabled mobile healthcare systems. IEEE Trans. Mob. Comput. 14(9), 1961–1974 (2015)

    Article  Google Scholar 

  4. Jiang, S., Zhu, X., Hao, R., et al.: Lightweight and privacy-preserving agent data transmission for mobile healthcare. In: IEEE International Conference on Communications, pp. 7322–7327. IEEE (2015)

    Google Scholar 

  5. Santos-Pereira, C., Augusto, A.B., Cruz-Correia, R., et al.: A secure RBAC mobile agent access control model for healthcare institutions. In: Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, pp. 349–354 IEEE (2013)

    Google Scholar 

  6. Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_7

    Chapter  Google Scholar 

  7. Kim, Y.S., Chang, J.H.: Self proxy signature scheme. IJCSNS Int. J. Comput. Sci. Netw. Secur. 7(2), 335–338 (2007)

    Google Scholar 

  8. Yu, Y., Xu, C., Huang, X.: An efficient anonymous proxy signature scheme with provable security. Comput. Stand. Interfaces 31(2), 348–353 (2009)

    Article  Google Scholar 

  9. Li, F., Zhong, D., Takagi, T.: Practical identity-based signature for wireless sensor networks. IEEE Wirel. Commun. Lett. 1(6), 637–640 (2012)

    Article  Google Scholar 

  10. Jung, T., Li, X., Wan, Z.: Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 10(1), 190–199 (2015)

    Article  Google Scholar 

  11. Guo, L., Zhu, X., Zhang, C., et al.: Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers. In: Global Communications Conference on 2013, pp. 629–634. IEEE (2013)

    Google Scholar 

  12. Liu, Z., Cao, Z., Wong, D.S.: Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild. IEEE Trans. Inf. Forensics Secur. 10(1), 55–68 (2015)

    Article  Google Scholar 

  13. Fugkeaw S, Sato H. An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud. In: Computer Software and Applications Conference IEEE, pp. 73–78. IEEE Computer Society (2015)

    Google Scholar 

  14. Zhu, H., Du, S., Li, M., Gao, Z.: Fairness-aware and privacy-preserving friend matching protocol in mobile social networks. IEEE Trans. Emerging Topics in Comput. 1(1), 192–200 (2013)

    Article  Google Scholar 

  15. Chen, Y., Zhang, L., Weng, Y.: A data encryption algorithm based on dual chaotic system. In: International Conference on Computer Application and System Modeling, vol. 4, pp. V431–435. IEEE (2010)

    Google Scholar 

  16. Hazay, C., Toft, T.: Computationally secure pattern matching in the presence of malicious adversaries. J. Cryptol. 27, 358–395 (2014)

    Article  MathSciNet  Google Scholar 

  17. Lindell, Y., Pinkas, B., Smart, N.P.: Implementing two-party computation efficiently with security against malicious adversaries. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 2–20. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85855-3_2

    Chapter  MATH  Google Scholar 

  18. Chang, W., Wu, J.: Progressive or conservative: rationally allocate cooperative work in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 26(7), 2020–2035 (2015)

    Article  Google Scholar 

  19. Tang, K., Shi, R.H., Dong J.: Throughput Analysis of Cognitive Wireless Acoustic Sensor Networks with Energy Harvesting. Futur. Gener. Comput. Syst. (2017). https://doi.org/10.1016/j.future.2017.07.032

    Article  Google Scholar 

  20. Xie, K., Cao, J., Wang, X., Wen, J.: Optimal resource allocation for reliable and energy efficient cooperative communications. IEEE Trans. Wireless Commun. 12(10), 4994–5007 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Luo, E., Wang, G., Tang, K., Zhao, Q., He, C., Guo, L. (2018). Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. In: Su, C., Kikuchi, H. (eds) Information Security Practice and Experience. ISPEC 2018. Lecture Notes in Computer Science(), vol 11125. Springer, Cham. https://doi.org/10.1007/978-3-319-99807-7_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99807-7_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99806-0

  • Online ISBN: 978-3-319-99807-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics