HCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems Xuhui Liu [1], Qin Liu [1], Tao Peng [2], and Jie Wu [3] [1] Hunan University, China.

Slides:



Advertisements
Similar presentations
Dynamic Generation of Data Broadcasting Programs for Dynamic Generation of Data Broadcasting Programs for a Broadcast Disk Array in a Mobile Computing.
Advertisements

Computing Structural Similarity of Source XML Schemas against Domain XML Schema Jianxin Li 1 Chengfei Liu 1 Jeffrey Xu Yu 2 Jixue Liu 3 Guoren Wang 4 Chi.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Fast Algorithms For Hierarchical Range Histogram Constructions
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Language Model for Cyrillic Mongolian to Traditional Mongolian Conversion Feilong Bao, Guanglai Gao, Xueliang Yan, Hongwei Wang
Iterative Optimization and Simplification of Hierarchical Clusterings Doug Fisher Department of Computer Science, Vanderbilt University Journal of Artificial.
Pei Fan*, Ji Wang, Zibin Zheng, Michael R. Lyu Toward Optimal Deployment of Communication-Intensive Cloud Applications 1.
An Optimal Algorithm of Adjustable Delay Buffer Insertion for Solving Clock Skew Variation Problem Juyeon Kim, Deokjin Joo, Taehan Kim DAC’13.
SKELETON BASED PERFORMANCE PREDICTION ON SHARED NETWORKS Sukhdeep Sodhi Microsoft Corp Jaspal Subhlok University of Houston.
Embedded Software Optimization for MP3 Decoder Implemented on RISC Core Yingbiao Yao, Qingdong Yao, Peng Liu, Zhibin Xiao Zhejiang University Information.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Mining Hierarchical Decision Rules from Hybrid Data with Categorical and Continuous Valued Attributes Miao Duoqian, Qian Jin, Li Wen, Zhang Zehua.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Decidability of Minimal Supports of S-invariants and the Computation of their Supported S- invariants of Petri Nets Faming Lu Shandong university of Science.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
USpan: An Efficient Algorithm for Mining High Utility Sequential Patterns Authors: Junfu Yin, Zhigang Zheng, Longbing Cao In: Proceedings of the 18th ACM.
Fine-Grained Access Control (FGAC) in the Cloud Robert Barton.
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
Linear Fault Analysis of Block Ciphers Zhiqiang Liu 1, Dawu Gu 1, Ya Liu 1, Wei Li 2 1. Shanghai Jiao Tong University 2. Donghua University ACNS 2012 June.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Binary Image Compression via Monochromatic Pattern Substitution: A Sequential Speed-Up Luigi Cinque and Sergio De Agostino Computer Science Department.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
An Ad Hoc Group Signature Scheme for Accountable and Anonymous Access to Outsourced Data Chuang Wang a,b and Wensheng Zhang a a Department of Computer.
TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering.
Architectural Support for Fine-Grained Parallelism on Multi-core Architectures Sanjeev Kumar, Corporate Technology Group, Intel Corporation Christopher.
Y. Kotani · F. Ino · K. Hagihara Springer Science + Business Media B.V Reporter: 李長霖.
BFTCloud: A Byzantine Fault Tolerance Framework for Voluntary-Resource Cloud Computing Yilei Zhang, Zibin Zheng, and Michael R. Lyu
1 Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandey Amit Sahai Brent Waters UCLA SRI.
Querying Structured Text in an XML Database By Xuemei Luo.
Protecting Sensitive Labels in Social Network Data Anonymization.
Identity-Based Secure Distributed Data Storage Schemes.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
Dominant Resource Fairness: Fair Allocation of Multiple Resource Types Ali Ghodsi, Matei Zaharia, Benjamin Hindman, Andy Konwinski, Scott Shenker, Ion.
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Privacy Preserving Delegated Access Control in Public Clouds.
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
Modeling and Simulation of Cloud Computing:A Review Wei Zhao, Yong Peng, Feng Xie, Zhonghua Dai 報告者 : 饒展榕.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Reporter : Yu Shing Li 1.  Introduction  Querying and update in the cloud  Multi-dimensional index R-Tree and KD-tree Basic Structure Pruning Irrelevant.
Zhuo Peng, Chaokun Wang, Lu Han, Jingchao Hao and Yiyuan Ba Proceedings of the Third International Conference on Emerging Databases, Incheon, Korea (August.
2013/12/09 Yun-Chung Yang Partitioning and Allocation of Scratch-Pad Memory for Priority-Based Preemptive Multi-Task Systems Takase, H. ; Tomiyama, H.
Privacy Preserving Back- Propagation Neural Network Learning Made Practical with Cloud Computing.
StrideBV: Single chip 400G+ packet classification Author: Thilan Ganegedara, Viktor K. Prasanna Publisher: HPSR 2012 Presenter: Chun-Sheng Hsueh Date:
An Efficient Linear Time Triple Patterning Solver Haitong Tian Hongbo Zhang Zigang Xiao Martin D.F. Wong ASP-DAC’15.
October 2008 Integrated Predictive Simulation System for Earthquake and Tsunami Disaster CREST/Japan Science and Technology Agency (JST)
M. Accetta, R. Baron, W. Bolosky, D. Golub, R. Rashid, A. Tevanian, and M. Young MACH: A New Kernel Foundation for UNIX Development Presenter: Wei-Lwun.
m-Privacy for Collaborative Data Publishing
Attribute-Based Encryption With Verifiable Outsourced Decryption.
Dynamic Scheduling Monte-Carlo Framework for Multi-Accelerator Heterogeneous Clusters Authors: Anson H.T. Tse, David B. Thomas, K.H. Tsoi, Wayne Luk Source:
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Encryption Extensions Model based on Hidden Attribute Certificate LI Yu 1,2,3, ZHAO Yong 1,2,3, GONG Bei 1 1 College of Computer Science and Technology,
Multi-Task Assignment for CrowdSensing in Mobile Social Network Mingjun Xiao ∗, Jie Wu†, Liusheng Huang ∗, Yunsheng Wang‡, and Cong Liu§
Cloud Multi-domain Access Control Model Based on Role and Trust-degree Lixia Xie Chong Wang School of Computer Science and Technology Civil Aviation University.
Shadow Detection in Remotely Sensed Images Based on Self-Adaptive Feature Selection Jiahang Liu, Tao Fang, and Deren Li IEEE TRANSACTIONS ON GEOSCIENCE.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
BY S.S.SUDHEER VARMA (13NT1D5816)
Sensors Journal, IEEE, Issue Date: May 2013,
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Privacy Preserving Subgraph Matching on Large Graphs in Cloud
Byung Joon Park, Sung Hee Kim
Privacy Preserving Ranked Multi-Keyword
Assoc. Prof. Dr. Syed Abdul-Rahman Al-Haddad
Pei Fan*, Ji Wang, Zibin Zheng, Michael R. Lyu
On the Designing of Popular Packages
Practice Management & Patient Health Record sharing system
Presentation transcript:

HCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems Xuhui Liu [1], Qin Liu [1], Tao Peng [2], and Jie Wu [3] [1] Hunan University, China [2] Central South University, China [3] Temple University, USA

Outline 1. Abstract & Introduction 2. Preliminaries 3. Scheme description Experimental Results 5. Conclusion

Abstract & Introduction Application scenario Contributions Comparison-based Encryption(CBE) Personal Health Record(PHR)

Abstract & Introduction Personal health record (PHR) is a patient-centric model of health information exchange. It has become popular with more and more users due to its convenience to access a patient’s centralized profile. PHR allows medical practitioners to online access a complete and accurate summary of a patient’s medical history. What is Personal Health Record ? What is Comparison-based encryption ? m Comparison-based encryption (CBE) was the first to realize time comparison in attribute-based access policy by means of the forward/backward derivation functions.

Abstract & Introduction For example, suppose that the access policy of the ciphertext is At ∧ [tx, ty], and the authorization time of the user with attribute At is [ta, tb]. Then, the user can decrypt the ciphertext only when the current time (tc ∈ [tx, ty]) ∧ (tc ∈ [ta, tb]). The drawback of CBE m The main drawback of CBE is that the encryption cost grows linearly with the number of attributes in the access policy. For a system of a large number of attributes, the cost for encryption may be extensive.

Abstract & Introduction Solutions To efficiently realize a fine-grained access control for PHRs in clouds, we propose a hierarchical comparison-based encryption (HCBE)scheme by incorporating an attribute hierarchy into CBE. The main idea of the HCBE scheme is building a hierarchical structure for attributes, where the attribute at a higher level is a generalization of the attributes at lower levels.

Abstract & Introduction Sample Application scenario

Abstract & Introduction 1. We proposed a hierarchical comparison-based encryption (HCBE) scheme,by incorporating attribute hierarchy into CBE, so as to efficiently achieve a fine-grained access control in cloud-based PHR systems. 2. We constructed an attribute hierarchy tree, and encode each attribute node with the PNDF coding. By applying the backward derivation function, the users with the specific attributes can decrypt the ciphertext encrypted with the generalized attributes. 3. We analyze the security of the proposed scheme, and conduct experiments to validate its effectiveness and efficiency Contributions

Preliminaries BDF & FDF in CBE scheme System model

System model

System model The system consists of the following parties: the cloud service provider (CSP),the data owner, and the data users. The CSP operates the cloud-based PHR system, which locates on a large number of interconnected cloud servers with abundant hardware resources. The data owner is the individual patient who employs the cloud- based PHR system to manage her PHR. The data users are the entities who is authorized by the data owner to access the cloud-based PHR system.

FDF & BDF in CBE scheme CBE scheme utilizes “one-way” property to represent the total ordering relation of integers. This means that given the integer relation   ≤   and two corresponding values  ,  , there exists an efficient algorithm to obtain   from  , however, it is hard to compute   j from   i. Firstly, we define two mapping functions (  ( ⋅ ), ( ⋅ )) from an integer set  = {  1, ⋅ ⋅ ⋅,   } into  = {   1, ⋅ ⋅ ⋅,    } and = {   1, ⋅ ⋅ ⋅,    } as follows:

FDF & BDF in CBE scheme Next, according to the definition of  ( ⋅ ) and ( ⋅ ), it is easy to define the FDF  ( ⋅ ) and BDF ( ⋅ ) as :

Scheme description Our Construction Basic scheme Positive-Negative Depth-First Coding

Positive-Negative Depth-First Coding Take the attribute tree is shown in left as an example. The PNDF coding is shown in right. Let Pcodei and Ncodei denote the Pcode and Ncode of node i, respectively. The PNDF coding has the property that Pcodei > Pcodej and Ncodei > Ncodej, if i is the descendant node of j.

Basic scheme We apply the BDF to accomplish the attribute hierarchy. The denition of the HCBE scheme is as follows: Next, we define mapping functions ψ1(.), ψ2(.) is as follows:

Basic scheme According to the definitions of ψ1(.), ψ2(.), it is easy to define BDFs f1(.), f2(.) as follows:

Our construction The definition of the HCBE scheme consists of the following algorithms:

Experimental Results In this section, we will compare our proposed scheme with the CBE scheme interms of computation cost. Our experiments are conducted with Java programming language. We implement our scheme on an stand-alone mode, on a PC with Intel Core i3 CPU running at 2.3GHz and 2G memory. The parameter settings in the experiments are as follows : NA is the number of specific attributes in the access policy, m indicates the number of attribute nodes in an attribute hierarchy tree. Here, we take m = 50,NA = 10 and m = 100, respectively.

Experimental Results As shown in Fig. 5, the encryption time of our scheme is much smaller than that of the CBE scheme. Furthermore, with the decrease of the number of attribute, m, in access policy, our scheme has better performance. Therefore, in our scheme, the data owner’s time overhead will be reduced, thereby getting better service experience.

Conclusion In this paper, we proposed a HCBE scheme for achieving a fine-grained access control in cloud- based PHR systems. Our scheme supports time comparison in attribute-based encryption in an efficient way, by incorporating attribute hierarchy into CBE.

Conclusion Thank you! Q&A