Abstract
To solve doctor’s service bottlenecks under the peak condition of mobile medical, the paper proposes utilizing authorized agents to provide service, so as to reduce the burden of doctors and enhance the flexibility of service as well. We use attribute encryption technology to encrypt medical data, the ciphertext can be decrypted correctly when the proxy attribute satisfies the policy set by the authorized user, so as to obtain proxy signature to provide medical service for medical users. The scheme not only can alleviate the burden on the mobile medical service providers in the peak of the bottleneck, but also can solve the authorization problem during the absence of doctors. At the same time, we can achieve proxy traceback to preform the agency accountability and to avoid unauthorized agency audit. This scheme can be used to reduce the computing cost of authorized doctors by using trusted authorization center. The simulation results reveal that the performance can be improved significantly than other scheme.
This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009 and 61472451, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006 and High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01; The Hunan Provincial Natural Science Foundation of China (2015JJ3046, 2018JJ2147); The Hunan Provincal Science and Technology Key Development Project 2017NK2390. Key Construction of Computer Application Technology, Hunan University of Science and Engineering (128030219-001).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lu, Z., Chen, X., Dong, Z.: A prototype of reflection pulse oximeter designed for mobile healthcare. IEEE J. Biomed. Health Inform. 20(5), 1 (2015)
Zhang, K., Yang, K., Liang, X.: Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wirel. Commun. 22(4), 104–112 (2015)
Ren, Y., Chen, Y., Chuah, M.C.: User verification leveraging gait recognition for smartphone enabled mobile healthcare systems. IEEE Trans. Mob. Comput. 14(9), 1961–1974 (2015)
Jiang, S., Zhu, X., Hao, R., et al.: Lightweight and privacy-preserving agent data transmission for mobile healthcare. In: IEEE International Conference on Communications, pp. 7322–7327. IEEE (2015)
Santos-Pereira, C., Augusto, A.B., Cruz-Correia, R., et al.: A secure RBAC mobile agent access control model for healthcare institutions. In: Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, pp. 349–354 IEEE (2013)
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_7
Kim, Y.S., Chang, J.H.: Self proxy signature scheme. IJCSNS Int. J. Comput. Sci. Netw. Secur. 7(2), 335–338 (2007)
Yu, Y., Xu, C., Huang, X.: An efficient anonymous proxy signature scheme with provable security. Comput. Stand. Interfaces 31(2), 348–353 (2009)
Li, F., Zhong, D., Takagi, T.: Practical identity-based signature for wireless sensor networks. IEEE Wirel. Commun. Lett. 1(6), 637–640 (2012)
Jung, T., Li, X., Wan, Z.: Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 10(1), 190–199 (2015)
Guo, L., Zhu, X., Zhang, C., et al.: Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers. In: Global Communications Conference on 2013, pp. 629–634. IEEE (2013)
Liu, Z., Cao, Z., Wong, D.S.: Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild. IEEE Trans. Inf. Forensics Secur. 10(1), 55–68 (2015)
Fugkeaw S, Sato H. An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud. In: Computer Software and Applications Conference IEEE, pp. 73–78. IEEE Computer Society (2015)
Zhu, H., Du, S., Li, M., Gao, Z.: Fairness-aware and privacy-preserving friend matching protocol in mobile social networks. IEEE Trans. Emerging Topics in Comput. 1(1), 192–200 (2013)
Chen, Y., Zhang, L., Weng, Y.: A data encryption algorithm based on dual chaotic system. In: International Conference on Computer Application and System Modeling, vol. 4, pp. V431–435. IEEE (2010)
Hazay, C., Toft, T.: Computationally secure pattern matching in the presence of malicious adversaries. J. Cryptol. 27, 358–395 (2014)
Lindell, Y., Pinkas, B., Smart, N.P.: Implementing two-party computation efficiently with security against malicious adversaries. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 2–20. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85855-3_2
Chang, W., Wu, J.: Progressive or conservative: rationally allocate cooperative work in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 26(7), 2020–2035 (2015)
Tang, K., Shi, R.H., Dong J.: Throughput Analysis of Cognitive Wireless Acoustic Sensor Networks with Energy Harvesting. Futur. Gener. Comput. Syst. (2017). https://doi.org/10.1016/j.future.2017.07.032
Xie, K., Cao, J., Wang, X., Wen, J.: Optimal resource allocation for reliable and energy efficient cooperative communications. IEEE Trans. Wireless Commun. 12(10), 4994–5007 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Luo, E., Wang, G., Tang, K., Zhao, Q., He, C., Guo, L. (2018). Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. In: Su, C., Kikuchi, H. (eds) Information Security Practice and Experience. ISPEC 2018. Lecture Notes in Computer Science(), vol 11125. Springer, Cham. https://doi.org/10.1007/978-3-319-99807-7_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-99807-7_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99806-0
Online ISBN: 978-3-319-99807-7
eBook Packages: Computer ScienceComputer Science (R0)