Skip to main content

A KP-ABE-Based ECC Approach for Internet of Medical Things

  • Conference paper
  • First Online:
Proceedings on International Conference on Data Analytics and Computing (ICDAC 2022)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 175))

Included in the following conference series:

  • 78 Accesses

Abstract

In Internet of Medical Things (IoMT), Healthcare providers carried out electronic Personal Health Record (PHR) to manage the health data of individuals in such a heterogeneous IoMT environment. PHR, on the other hand, comprises sensitive information about which privacy and security issues are important. Key Policy Attribute-Based Encryption (KP-ABE) is a modern encryption technique that provides security with an access control mechanism. Here, we propose a PHR Access Control (PAC) scheme by using KP-ABE for sharing personal health record in the IoMT environment. Elliptic Curve Cryptography (ECC) provides a strong notion of security with smaller key sizes. Therefore, we use the point scalar multiplication of ECC to reduce the computational cost of PHR owners and PHR users. The adoption of KP-ABE using ECC for exchanging PHR greatly enhanced overall efficiency while also ensuring personal health data security, according to the experimental investigation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dasaklis TK, Casino F, Patsakis C (2018) Blockchain meets smart health: Towards next generation healthcare services. In: 2018 9th international conference on information, intelligence, systems and applications (IISA). IEEE, pp 1–8

    Google Scholar 

  2. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 457–473

    Google Scholar 

  3. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp 89–98

    Google Scholar 

  4. Ding S, Li C, Li H (2018) A novel efficient pairing-free cp-abe based on elliptic curve cryptography for iot. IEEE Access 6:27336–27345

    Article  Google Scholar 

  5. Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Futur Gener Comput Syst 49:104–112

    Google Scholar 

  6. Tan S-Y, Yeow K-W, Hwang SO (2019) Enhancement of a lightweight attribute-based encryption scheme for the internet of things. IEEE Internet Things J 6(4):6384–6395

    Google Scholar 

  7. Fengou M-A, Mantas G, Lymberopoulos D, Komninos N, Fengos S, Lazarou N (2012) A new framework architecture for next generation e-health services. IEEE J Biomed Health Inform 17(1):9–18

    Article  Google Scholar 

  8. Fugkeaw S (2021) A lightweight policy update scheme for outsourced personal health records sharing. IEEE Access 9:54862–54871

    Article  Google Scholar 

  9. Zhang L, You W, Mu Y (2021) Secure outsourced attribute-based sharing framework for lightweight devices in smart health systems. IEEE Trans Serv Comput

    Google Scholar 

  10. Aman AH, Hassan WH, Sameen S, Attarbashi ZS, Alizadeh M, Latiff LA (2020) Iomt amid covid-19 pandemic: Application, architecture, technology, and security. J Netw Comput Appl 102886

    Google Scholar 

  11. Zhong H, Zhou Y, Zhang Q, Yan X, Cui J (2021) An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. Futur Gener Comput Syst 115:486–496

    Article  Google Scholar 

  12. de Oliveira MT, Dang HV, Reis LH, Marquering HA, Olabarriaga SD (2021) Ac-ac: dynamic revocable access control for acute care teams to access medical records. Smart Health 20:100190

    Google Scholar 

  13. Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209

    Article  MathSciNet  MATH  Google Scholar 

  14. Bethencourt J, Sahai A, and Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP’07). IEEE, pp 321–334

    Google Scholar 

  15. Beimel A et al (1996) Secure schemes for secret sharing and key distribution

    Google Scholar 

  16. Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp. 568–588

    Google Scholar 

  17. Aitzhan NZ, Svetinovic D (2016) Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans Dependable Secur Comput 15(5):840–852

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dilip Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, D., Kumar, M. (2023). A KP-ABE-Based ECC Approach for Internet of Medical Things. In: Yadav, A., Gupta, G., Rana, P., Kim, J.H. (eds) Proceedings on International Conference on Data Analytics and Computing. ICDAC 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 175. Springer, Singapore. https://doi.org/10.1007/978-981-99-3432-4_3

Download citation

Publish with us

Policies and ethics