Skip to main content

Advertisement

Log in

An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against ‘man-in-the-middle attack’ or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.’s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu–Chen’s scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu–Chen’s scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu–Chen’s scheme, Nikooghadam–Zakerolhosseini’s scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Advanced Encryption Standard, FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. Accessed on November 2010.

  2. Akl, S. G., and Taylor, P. D., Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. (TOCS) 1(3):239–248, 1983.

    Article  Google Scholar 

  3. Aumasson, J. P., Henzen, L., Meier, W., and Plasencia, M. N., Quark: A lightweight hash. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), LNCS. Vol. 6225, pp. 1–15, 2010.

  4. Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J. B., Seurin, Y., and Vikkelsoe, C., PRESENT: An ultra-lightweight block cipher. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), LNCS. Vol. 4727, pp. 450–466, 2007.

  5. Canniere, C. D., Dunkelman, O., and Knezevic, M., KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009), LNCS. Vol. 5747, pp. 272–288, 2009.

  6. Chung, Y. F., Lee, H. H., Lai, F., and Chen, T. S., Access control in user hierarchy based on elliptic curve cryptosystem. Inform. Sci. 178(1):230–243, 2008.

    Article  MathSciNet  MATH  Google Scholar 

  7. Das, A. K., A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw. Sci., 2012. doi:10.1007/s13119-012-0009-8.

    Google Scholar 

  8. Das, A. K., A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int. J. Inf. Secur. 11(3):189–211, 2012.

    Article  Google Scholar 

  9. Das, A. K., Paul, N. R., and Tripathy, L., Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Inform. Sci. 209:80–92, 2012.

    Article  MathSciNet  MATH  Google Scholar 

  10. DeWin, E., Bosselaers, A., Vandenberghe, S., De Gersem, P. and Vandewalle, J., A fast software implementation for arithmetic operations in \(GF(2^{n})\). In: Proceedings of Advances in Cryptology - ASIACRYPT ’96, LNCS. Vol. 1163, pp. 65–76. Springer-Verlag, 1996.

  11. Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198–208, 1983.

    Article  MathSciNet  MATH  Google Scholar 

  12. Jeng, F. G., and Wang, C. M., An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. J. Syst. Softw. 79(8):1161–1167, 2006.

    Article  Google Scholar 

  13. Knudsen, L. R., Leander, G., Poschmann, A., and Robshaw, M. J. B., PRINTcipher: A block cipher for IC-Printing. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), LNCS. Vol. 6225, pp. 16–32, 2010.

  14. Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48:203–209, 1987.

    Article  MathSciNet  MATH  Google Scholar 

  15. Koblitz, N., Menezes, A., and Vanstone, S. A., The state of elliptic curve cryptography. Des. Codes Crypt. 19(2–3):173–193, 2000.

    Article  MathSciNet  MATH  Google Scholar 

  16. Liao, H. Z., and Shen, Y. Y., On the elliptic curve digital signature algorithm. Tunghai Sci. 8:109–126, 2006.

    Google Scholar 

  17. Lin, Y.-L., and Hsu, C.-L., Secure key management scheme for dynamic hierarchical access control based on ECC. J. Syst. Softw. 84(4):679–685, 2011.

    Article  Google Scholar 

  18. Nickalls, R. W. D., A new approach to solving the cubic: Cardan’s solution revealed. Math. Gaz. 77(480):354–359, 1993.

    Article  Google Scholar 

  19. Nikooghadam, M., and Zakerolhosseini, A., Secure communication of medical information using mobile agents. J. Med. Syst., 2012. doi:10.1007/s10916-012-9857-8.

    Google Scholar 

  20. Nikooghadam, M., Zakerolhosseini, A., and Moghaddam, M. E., Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J. Syst. Softw. 83(10):1917–1929, 2010.

    Article  Google Scholar 

  21. Pang, C., Hansen, D., and Maeder, A., Managing RBAC states with transitive relations. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS ’07), pp. 139–148, 2007.

  22. Schroeppel, R., Orman, H., O’Malley, S., and Spatscheck, O., Fast key exchange with elliptic curve systems. In: Proceedings of Advances in Cryptology - CRYPTO ’95, LNCS. Vol. 963, pp. 43–56. Springer-Verlag, 1995.

  23. Stallings, W., Cryptography and network security: principles and practices. 3 ed.: Prentice Hall, 2003.

  24. Secure Hash Standard . FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995

  25. Wu, S., and Chen, K., An efficient key-management scheme for hierarchical access control in E-Medicine system. J. Med. Syst., 2011. doi:10.1007/s10916-011-9700-7.

    Google Scholar 

  26. Wu, Z.-Y., Chung, Y., Lai, F., and Chen, T.-S., A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2):631–638, 2012.

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to acknowledge the many helpful suggestions of the anonymous reviewers, which have improved the content and the presentation of this paper.

Conflict of interests

The authors declare that they have no conflict of interest.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashok Kumar Das.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Odelu, V., Das, A.K. & Goswami, A. An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System. J Med Syst 37, 9920 (2013). https://doi.org/10.1007/s10916-012-9920-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-012-9920-5

Keywords