Skip to main content
Log in

Extended chaotic map-based key management for hierarchical access control in e-medicine systems

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Hierarchical access control key management is a technique that involves grouping users into several categories such that each group has a distinct level of authority, thereby reducing the inconvenience that users and administrators face in storing and managing keys. The primary objective of the key management scheme is to distribute keys efficiently and manage them dynamically. Several hierarchical access control key management schemes have recently been proposed to protect e-medicine systems' security. However, these schemes often have security vulnerabilities or require significant storage space and computation. As the hospital organizational structure differs from the standard hierarchical structure, the current hierarchical access control scheme cannot fully leverage the original access control scheme's benefits. Recently, enhanced Chebyshev chaotic maps have shown superiority over traditional cryptographic systems that use modular exponent operations, exhibiting semi-group and commutative properties. This study proposes a secure and efficient key management scheme for e-medical systems using enhanced Chebyshev chaotic maps. Compared with related schemes, the proposed scheme addresses previous security limitations and outperforms other schemes in terms of functionality and performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data availability

No datasets were analyzed or generated during the course of the current study.

References

  1. Akl SG, Taylor PD (1983) Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst 1(3):239–248

    Google Scholar 

  2. Jeng FG, Wang CM (2006) An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. J Syst Softw 79(8):1161–1167

    Article  Google Scholar 

  3. Chung YF, Lee HH, Lai F, Chen TS (2008) Access control in user hierarchy based on elliptic curve cryptosystem. Inf Sci 178(1):230–243

    Article  MathSciNet  Google Scholar 

  4. Edmund LCS, Ramaiah CK, Gulla SP (2009) Electronic medical records management systems: An overview. DESIDOC J Libr Inf Technol 29(6):3

    Article  Google Scholar 

  5. Heart T, Ben-Assuli O, Shabtai I (2017) A review of PHR, EMR and EHR integration: A more personalized healthcare and public health policy. Health Policy Technol 6(1):20–25

    Article  Google Scholar 

  6. Lee TF, Chang IP, Su GJ (2023) Compliance with HIPAA and GDPR in certificateless-based authenticated key agreement using extended chaotic maps. Electronics 12(5):1108

    Article  Google Scholar 

  7. Nikooghadam M, Zakerolhosseini A, Moghaddam ME (2010) Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J Syst Softw 83(10):1917–1929

    Article  Google Scholar 

  8. Wu S, Chen K (2011) An efficient key-management scheme for hierarchical access control in E-Medicine system. J Med Syst 36(4):2325–2337

    Article  Google Scholar 

  9. Nikooghadam M, Zakerolhosseini A (2012) Secure communication of medical information using mobile agents. J Med Syst 36(6):3839–3850

    Article  Google Scholar 

  10. Hassen HR, Bettahar H, Bouadbdallah A, Challal Y (2012) An efficient key management scheme for content access control for linear hierarchies. Comput Netw 56(8):2107–2118

    Article  Google Scholar 

  11. Das AK, Paul NY, Tripathy L (2012) Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Inf Sci 209(20):80–92

    Article  MathSciNet  Google Scholar 

  12. Odelu V, Das AK, Goswami A (2013) An effective and secure key-management scheme for hierarchical access control in e-medicine system. J Med Syst 37(2)

  13. Chao WY, Tsai CY, Hwang MS (2017) An improved key-management scheme for hierarchical access control. Int J Netw Secur 19(4):639–643

    Google Scholar 

  14. Sivasundari A, Ramakrishnan M (2018) Hybrid PRNS version of elliptic curve cryptography with signcryption based security enhancement technique for dynamic key management system. J Comput Theor Nanosci 15(1):299–310

    Article  Google Scholar 

  15. Lin YL, Hsu CL (2011) Secure key management scheme for dynamic hierarchical access control based on ECC. J Syst Softw 84(4):679–685

    Article  MathSciNet  Google Scholar 

  16. Xing Q, Wang B, Wang X, Chen P, Yu B, Tang Y, Gao X (2016) Unbounded revocable hierarchical identity-based encryption with adaptive-id security. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 430–437). IEEE

  17. Pareek G, Purushothama BR (2019) Extended hierarchical key assignment scheme (E-HKAS): how to efficiently enforce explicit policy exceptions in dynamic hierarchies. Sādhanā 44(12):235

    Article  MathSciNet  Google Scholar 

  18. Abi-Char PE, Nader P, Mahfouz S (2021) A secure key management scheme for hierarchical access control with secret key validity checking. In: 2021 44th International Conference on Telecommunications and Signal Processing (TSP) (pp 27–33). IEEE

  19. Xiao D, Liao XO, Deng SJ (2008) Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf Sci 178(6):1598–1602

    Article  MathSciNet  Google Scholar 

  20. Niu YJ, Wang XY (2011) An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 16(4):1986–1992

    Article  MathSciNet  Google Scholar 

  21. Xue KP, Hong PL (2012) Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 17(7):2969–2977

    Article  MathSciNet  Google Scholar 

  22. Lee CC, Hsu SW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1–2):201–211

    Article  MathSciNet  Google Scholar 

  23. Lee CC, Chen CL, Wu CY, Huang SY (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1–2):79–87

    Article  MathSciNet  Google Scholar 

  24. Wang X, Zhao JF (2010) An improved key agreement protocol based on chaos. Commun Nonlinear Sci Numer Simul 15(12):4052–4057

    Article  MathSciNet  Google Scholar 

  25. Guo XF, Zhang JS (2010) Secure group key agreement protocol based on chaotic Hash. Inf Sci 180(20):4069–4074

    Article  MathSciNet  Google Scholar 

  26. Guo C, Chang CC (2013) Chaotic maps-based password-authenticated key agreement using smart cards. Commun Nonlinear Sci Numer Simul 18(6):1433–1440

    Article  MathSciNet  Google Scholar 

  27. He DB, Chen YT, Chen JH (2012) Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149–1157

    Article  MathSciNet  Google Scholar 

  28. Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Chaos, Solitons Fractals 39(3):1283–1289

    Article  MathSciNet  Google Scholar 

  29. Bergamo P, D’Arco P, Santis AD, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. In: IEEE Transactions on Circuits and systems—I: Regular papers, Vol 52, No 7, pp1382–1393

  30. Zhang LH (2006) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solit Fractals 37(3):669–674

    Article  MathSciNet  Google Scholar 

  31. Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc A: Math Phys Eng Sci 426:233–271. https://doi.org/10.1098/rspa.1989.0125

    Article  MathSciNet  Google Scholar 

Download references

Funding

National Science and Technology Council,NSTC 110-2221-E-320-005-MY2,NSTC 110-2221-E-320-005-MY2,NSTC 110-2221-E-320-005-MY2,NSTC 110-2221-E-320-005-MY2,NSTC 110-2221-E-320-005-MY2,Buddhist Tzu Chi Medical Foundation,TCMMP 112-02-03,TCMMP 112-02-03,TCMMP 112-02-03,TCMMP 112-02-03,TCMMP 112-02-03

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization, T.-F.L., I.-P.C., J.-G W., Y.-C. C., S.-T. T. and R.-U.Y.; methodology, T.-F.L., I.-P.C., J.-G W., Y.-C. C., S.-T. T. and R.-U.Y.; writing—original draft preparation, T.-F.L., I.-P.C. R.-U. C.; Writing—review and editing, T.-F.L., I.-P.C., J.-G W., Y.-C. C., S.-T. T.. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to I-Pin Chang.

Ethics declarations

Ethics approval

Not applicable.

Consent to publish

Not applicable.

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection on Special Issue on 2 - Track on Security and Privacy

Guest Editors: Rongxing Lu

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, TF., Chang, IP., Wang, JG. et al. Extended chaotic map-based key management for hierarchical access control in e-medicine systems. Peer-to-Peer Netw. Appl. 17, 858–870 (2024). https://doi.org/10.1007/s12083-023-01621-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01621-7

Keywords

Navigation