Abstract
Wireless body area network (WBAN) has emerged as one of the most promising technologies for e-healthcare. In recent years, cloud-assisted WBANs have attracted intensive attention from the academic and industrial communities. How to ensure data confidentiality, integrity, non-repudiation, and access control is an important and challenging issue for widespread deployment of cloud-assisted WBANs. In this paper, we introduce a new cryptographic primitive named key-policy attribute/identity-based signcryption (KP-AIBSC) scheme to address above challenge problem, which can fulfill the functionality of identity-based signature and key-policy attribute-based encryption in a logical step. We first give formal syntax and formulate security model of KP-AIBSC scheme. Next, we present a concrete KP-AIBSC construction from bilinear pairings. The proposed construction is proved to be indistinguishable against adaptive chosen plaintext attacks under the DBDH assumption and existentially unforgeable against adaptive chosen message and identity attacks under the CDH assumption in the random oracle model. Finally, we exhibit an efficient fine-grained cryptographic access framework for cloud-assisted WBANs by exploiting our proposed KP-AIBSC scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chen, M., Gonzalez, S., Vasilakos, A., et al.: Body area networks: a survey. Mob. Netw. Appl. 16(2), 171–193 (2011)
Cordeiro, C., Fantacci, R., Gupta, S., et al.: Body area networking: Technology and applications. IEEE J. Sel. Areas Commun. 27(1), 1–4 (2009)
Kupwade, P.H., Seshadri, R.: Big data security and privacy issues in health-care. In: IEEE International Congress on Big Data, pp. 762–765 (2014)
Sadiku, M.N.O., Musa, S.M., Momoh, O.D.: Cloud computing: opportunities and challenges. IEEE potentials 33(1), 34–36 (2014)
Li, M., Yu, S.C., Guttman, J.D., et al.: Secure ad hoc trust initialization and key management in wireless body area networks. Acm Trans. Sensor Netw. 9(2), 1–35 (2013)
Halperin, D., Heydt-Benjamin, T., Ransford, B., et al.: Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In: IEEE Symposium on Security and Privacy, pp. 129–142 (2008)
Malasri, K., Wang, L.: Design and implementation of a secure wireless mote-based medical sensor network. Sensors 9(8), 6273–6297 (2009)
Hu, C.Q., Zhang, N., Li, H.J., et al.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)
Tan, Y.L., Goi, B.M., Komiya, R., Phan, R.: Design and implementation of key-policy attribute-based encryption in body sensor network. Int. J. Cryptol. Res. 4(1), 84–101 (2013)
Liu, J.W., Zhang, Z.H., Chen, X.F., et al.: Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 332–342 (2014)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). doi:10.1007/11426639_27
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute based encryption for fine-grained access conrol of encrypted data. In: ACM conference on Computer and Communications Security, pp. 89–98 (2006)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_4
Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) \(\ll \) cost(signature) + cost(encryption). In: Kaliski Jr., B.S. (ed.) Advances in Cryptology—CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997). doi:10.1007/BFb0052234
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005). doi:10.1007/11593447_28
Wang, C.J., Huang, J.S.: Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 905–909. IEEE Press (2011)
Choon, J.C., Hee Cheon, J.: An identity-based signature from gap diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003). doi:10.1007/3-540-36288-6_2
Acknowledgments
This research is funded by National Natural Science Foundation of China (Grant No. 61173189).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Wang, C., Wu, J., Jiang, S. (2016). An Asymmetric Signcryption Scheme for Cloud-Assisted Wireless Body Area Network. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-49145-5_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49144-8
Online ISBN: 978-3-319-49145-5
eBook Packages: Computer ScienceComputer Science (R0)