Abstract
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against ‘man-in-the-middle attack’ or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.’s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu–Chen’s scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu–Chen’s scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu–Chen’s scheme, Nikooghadam–Zakerolhosseini’s scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.







Similar content being viewed by others
References
Advanced Encryption Standard, FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. Accessed on November 2010.
Akl, S. G., and Taylor, P. D., Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. (TOCS) 1(3):239–248, 1983.
Aumasson, J. P., Henzen, L., Meier, W., and Plasencia, M. N., Quark: A lightweight hash. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), LNCS. Vol. 6225, pp. 1–15, 2010.
Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J. B., Seurin, Y., and Vikkelsoe, C., PRESENT: An ultra-lightweight block cipher. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), LNCS. Vol. 4727, pp. 450–466, 2007.
Canniere, C. D., Dunkelman, O., and Knezevic, M., KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009), LNCS. Vol. 5747, pp. 272–288, 2009.
Chung, Y. F., Lee, H. H., Lai, F., and Chen, T. S., Access control in user hierarchy based on elliptic curve cryptosystem. Inform. Sci. 178(1):230–243, 2008.
Das, A. K., A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw. Sci., 2012. doi:10.1007/s13119-012-0009-8.
Das, A. K., A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int. J. Inf. Secur. 11(3):189–211, 2012.
Das, A. K., Paul, N. R., and Tripathy, L., Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Inform. Sci. 209:80–92, 2012.
DeWin, E., Bosselaers, A., Vandenberghe, S., De Gersem, P. and Vandewalle, J., A fast software implementation for arithmetic operations in \(GF(2^{n})\). In: Proceedings of Advances in Cryptology - ASIACRYPT ’96, LNCS. Vol. 1163, pp. 65–76. Springer-Verlag, 1996.
Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198–208, 1983.
Jeng, F. G., and Wang, C. M., An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. J. Syst. Softw. 79(8):1161–1167, 2006.
Knudsen, L. R., Leander, G., Poschmann, A., and Robshaw, M. J. B., PRINTcipher: A block cipher for IC-Printing. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), LNCS. Vol. 6225, pp. 16–32, 2010.
Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48:203–209, 1987.
Koblitz, N., Menezes, A., and Vanstone, S. A., The state of elliptic curve cryptography. Des. Codes Crypt. 19(2–3):173–193, 2000.
Liao, H. Z., and Shen, Y. Y., On the elliptic curve digital signature algorithm. Tunghai Sci. 8:109–126, 2006.
Lin, Y.-L., and Hsu, C.-L., Secure key management scheme for dynamic hierarchical access control based on ECC. J. Syst. Softw. 84(4):679–685, 2011.
Nickalls, R. W. D., A new approach to solving the cubic: Cardan’s solution revealed. Math. Gaz. 77(480):354–359, 1993.
Nikooghadam, M., and Zakerolhosseini, A., Secure communication of medical information using mobile agents. J. Med. Syst., 2012. doi:10.1007/s10916-012-9857-8.
Nikooghadam, M., Zakerolhosseini, A., and Moghaddam, M. E., Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J. Syst. Softw. 83(10):1917–1929, 2010.
Pang, C., Hansen, D., and Maeder, A., Managing RBAC states with transitive relations. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS ’07), pp. 139–148, 2007.
Schroeppel, R., Orman, H., O’Malley, S., and Spatscheck, O., Fast key exchange with elliptic curve systems. In: Proceedings of Advances in Cryptology - CRYPTO ’95, LNCS. Vol. 963, pp. 43–56. Springer-Verlag, 1995.
Stallings, W., Cryptography and network security: principles and practices. 3 ed.: Prentice Hall, 2003.
Secure Hash Standard . FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995
Wu, S., and Chen, K., An efficient key-management scheme for hierarchical access control in E-Medicine system. J. Med. Syst., 2011. doi:10.1007/s10916-011-9700-7.
Wu, Z.-Y., Chung, Y., Lai, F., and Chen, T.-S., A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2):631–638, 2012.
Acknowledgments
The authors would like to acknowledge the many helpful suggestions of the anonymous reviewers, which have improved the content and the presentation of this paper.
Conflict of interests
The authors declare that they have no conflict of interest.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Odelu, V., Das, A.K. & Goswami, A. An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System. J Med Syst 37, 9920 (2013). https://doi.org/10.1007/s10916-012-9920-5
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-012-9920-5