Skip to main content
Log in

Towards privacy protection and malicious behavior traceability in smart health

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

As a more ubiquitous concept, smart health (s-health) is the context-aware complement of mobile health within smart cities, and it has made an increasing number of people turn to cloud-based services. In a practical s-health system, security and privacy issues are of great importance and have to be addressed. In this paper, we propose a secure s-health system which realizes fine-grained access control on s-health cloud data and hence ensures users’ privacy protection. The key technique is a promising cryptographic primitive called ciphertext-policy attribute-based encryption. In order to trace malicious behaviors in the proposed s-health system, two kinds of key abuse problems are considered: malicious key sharing among colluding users and key escrow problem of the semi-trusted authority. In the proposed s-health system, any malicious behavior of a user including illegal key sharing can be traced. For the semi-trusted authority, it can be accountable for its misbehavior including illegal key re-distribution. Particularly, the proposed system supports large universe and attributes do not need to be pre-specified during the system initialization phase. Besides, our system is proven fully secure in the random oracle model and it allows any monotonic access policies. Theoretical analysis and experimental results indicate that the proposed s-health system is suitable for smart city environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

Notes

  1. The expression “weak public” is similar to the term “partial public” in [9], in which only private user traceability is realized.

References

  1. Solanas A, Patsakis C, Conti M, Vlachos IS, Ramos V, Falcone F, Postolache O, Pérez-Martínez PA, Di Pietro R, Perrea DN et al (2014) Smart health: a context-aware health paradigm within smart cities. IEEE Commun Mag 52(8):74–81

    Article  Google Scholar 

  2. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology-EUROCRYPT’05, volume 3494 of lecture notes in computer science. Springer, Berlin-Heidelberg, pp 557–557

  3. Goyal V, Pandey O, Sahai A, Waters B (2006) pages 89–98. In: Proceedings of the 13th ACM conference on computer and communications security, CCS’06. ACM, New York

  4. Lewko A, Waters B (2011) Unbounded hibe and attribute-based encryption. In: Advances in cryptology–EUROCRYPT’11. Springer, Berlin-Heidelberg, pp 547–567

  5. Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H (ed) Advances in cryptology-EUROCRYPT’10, volume 6110 of lecture notes in computer science. Springer, Berlin-Heidelberg, pp 62–91

  6. Li JX, Ren K, Kim K (2009) A2be: Accountable attribute-based encryption for abuse free access control. IACR Cryptol ePrint Archive 2009:118

    Google Scholar 

  7. Liu Z, Cao ZF, Wong DS (2013) White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans Inf Forensic Secur 8(1):76–88

    Article  Google Scholar 

  8. Liu Z, Cao Z, Wong DS (2013) cp-abe: Blackbox traceable how to catch people leaking their keys by selling decryption devices on ebay. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security. ACM, New York, pp 475–486

  9. Ning J, Cao Z, Dong X, Wei L, Lin X (2014) Large universe ciphertext-policy attribute-based encryption with white-box traceability. In: Computer security-ESORICS’14. Springer, Berlin-Heidelberg, pp 55–72

  10. Deng H, Wu Q, Qin B, Mao J, Liu X, Zhang L, Shi W (2014) Who is touching my cloud. In: Computer security-ESORICS’14. Springer, Berlin-Heidelberg, pp 362–379

  11. Ning J, Dong X, Cao Z, Wei L (2015) Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud. In: Computer security–ESORICS’15. Springer, Berlin-Heidelberg, pp 270–289

  12. Liu Z, Wong DS (2015) Practical ciphertext-policy attribute-based encryption: Traitor tracing, revocation, and large universe. In: Applied cryptography and network security–ACNS’15. Springer, Berlin-Heidelberg, pp 127–146

  13. Zhang X, Jin C, Li C, Wen Z, Shen Q, Fang Y, Wu Z (2015) Ciphertext-policy attribute-based encryption with user and authority accountability. In: Security and privacy in communication networks. Springer, Berlin-Heidelberg, pp 500–518

  14. Liu Z, Wong DS (2015) Traceable cp-abe on prime order groups: Fully secure and fully collusion-resistant blackbox traceable. In: International conference on information and communications security. Springer, Berlin-Heidelberg, pp 109–124

  15. Li Y, Dai W, Ming Z, Qiu M (2016) Privacy protection for preventing data over-collection in smart city. IEEE Trans Comput 65(5):1339–1350

    Article  MathSciNet  Google Scholar 

  16. Lomotey RK, Deters R (2014) Using a cloud-centric middleware to enable mobile hosting of web services: mhealth use case. Person Ubiquit Comput 18(5):1085–1098

    Article  Google Scholar 

  17. Guo P, Wang J, Li B, Lee S (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–936

    Google Scholar 

  18. Shen J, Tan H, Wang J, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171–178

    Google Scholar 

  19. Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352

    Article  Google Scholar 

  20. Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323

    Google Scholar 

  21. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy. IEEE, pp 321–334

  22. Cheung L, Newport C (2007) Provably secure ciphertext policy abe. In: Proceedings of the 14th ACM conference on computer and communications security, CCS’07. ACM, NY, USA, pp 456– 465

  23. Nishide T, Yoneyama K, Ohta K (2008) Abe with partially hidden encryptor-specified access structure. In: Bellovin S (ed) Proceedings of applied cryptography and network security–ACNS’08, volume 5037 of lecture notes in computer science. Springer, Berlin-Heidelberg, pp 111–129

  24. Lai J, Deng RH, Li Y (2012) Expressive cp-abe with partially hidden access structures. In: Proceedings of the 7th ACM symposium on information, computer and communications security, ASIACCS’12. ACM, New York, pp 18–19

  25. Zhang Y, Chen X, Li J, Wong DS, Li H (2013) Anonymous attribute-based encryption supporting efficient decryption test. In: Proceedings of the 8th ACM symposium on information, computer and communications security, ASIACCS’13. ACM, New York, pp 511–516

  26. Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61

    Article  Google Scholar 

  27. Zhang Y, Li J, Chen X, Li H (2016) Anonymous attribute-based proxy re-encryption for access control in cloud computing. Secur Commun Netw 9(14):2397–2411

    Article  Google Scholar 

  28. Yu S, Wang C, Ren K, Lou W (2010) Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM symposium on information, computer and communications security, ASIACCS’10. ACM, New York, pp 261–270

  29. Balu A, Kuppusamy K (2014) An expressive and provably secure ciphertext-policy attribute-based encryption. Inf Sci 276:354–362

    Article  MathSciNet  MATH  Google Scholar 

  30. Zhang Y, Zheng D, Chen X, Li J, Li H (2014) Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: Provable security, ProvSec’14. Springer, Berlin-Heidelberg, pp 259–273

  31. Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210

    Article  Google Scholar 

  32. Shi Y, Zheng Q, Liu J, Han Z (2015) Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Inf Sci 295:221–231

    Article  MathSciNet  MATH  Google Scholar 

  33. Zhang Y, Zheng D, Chen X, Li J, Li H (2016) Efficient attribute-based data sharing in mobile clouds. Pervasive Mob Comput 28:135–149

    Article  Google Scholar 

  34. Rouselakis Y (2013) Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the practical ACM SIGSAC conference on computer and communications security, CCS’13. ACM, New York, p 2013

  35. Okamoto T, Takashima K (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin T (ed) Advances in cryptology-CRYPTO’10, volume 6223 of lecture notes in computer science. Springer, Berlin-Heidelberg, pp 191–208

  36. Li J, Ren K, Zhu B, Wan Z (2009) Privacy-aware attribute-based encryption with user accountability. In: Samarati P (ed) Proceedings of the international information security conference. ISC’09, volume 5735 of lecture notes in computer science. Springer, Berlin-Heidelberg, pp 347–362

  37. Yu S, Ren K, Lou W, Li J (2009) Defending against key abuse attacks in kp-abe enabled broadcast systems. In: Chen Y (ed) Proceedings of the 5th international conference on security and privacy in communication networks. Securecomm’09, volume 19 of lecture notes in computer science. Springer, Berlin-Heidelberg, pp 311–329

  38. Li J, Huang Q, Chen X, Chow SSM, Wong DS, Xie D (2011) Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM symposium on information, computer and communications security, ASIACCS’11. ACM, New York, pp 386–390

  39. Liu Z, Cao Z, Wong DS (2015) Traceable cp-abe: how to trace decryption devices found in the wild. IEEE Trans Inf Forensic Secur 10(1):55–68

    Article  Google Scholar 

  40. Zhang Y, Li J, Zheng D, Chen X, Li H (2016) Accountable large-universe attribute-based encryption supporting any monotone access structures. In: Australasian conference on information security and privacy, ACISP’16. Springer, Berlin-Heidelberg, pp 509–524

  41. Boneh D, Goh E-J, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. Springer, Berlin-Heidelberg, pp 325–341

  42. Schnorr C-P (1989) Efficient identification and signatures for smart cards. In: Advances in cryptology-CRYPTO’89 proceedings. Springer, Berlin-Heidelberg, pp 239–252

  43. Bellare M, Goldreich O (1992) On defining proofs of knowledge. In: Advances in cryptology-CRYPTO’92. Springer, Berlin-Heidelberg, pp 390–420

  44. Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, Technion-Israel Institute of Technology Faculty of computer science

  45. Boneh D, Boyen X (2004). In: Short signatures without random oracles. In Advances in cryptology-EUROCRYPT’04. Springer, Berlin-Heidelberg, pp 56–73

Download references

Acknowledgements

This work is supported by National Natural Science Foundation of China (No. 61402366, 61472091, 61472472, and 61272037), Natural Science Basic Research Plan in Shaanxi Province (No. 2015JQ6236, 2013JZ020), Scientific Research Program Funded by Shaanxi Provincial Education Department (No. 15JK1686), Program for New Century Excellent Talents in University (No. NCET-13-0946), Doctoral Fund of Ministry of Education of China (No. 20130203110004), and Distinguished Young Scholars Fund of Department of Education, Guangdong Province (No. Yq2013126). Yinghui Zhang is supported by New Star Team of Xi’an University of Posts and Telecommunications.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yinghui Zhang or Dong Zheng.

Additional information

A preliminary version of this paper appears in ACISP 2016.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y., Li, J., Zheng, D. et al. Towards privacy protection and malicious behavior traceability in smart health. Pers Ubiquit Comput 21, 815–830 (2017). https://doi.org/10.1007/s00779-017-1047-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-017-1047-8

Keywords

Navigation