scholarly journals A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience

2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Yinghui Zhang ◽  
Pengzhen Lang ◽  
Dong Zheng ◽  
Menglei Yang ◽  
Rui Guo

With the development of the smart health (s-health), data security and patient privacy are becoming more and more important. However, some traditional cryptographic schemes can not guarantee data security and patient privacy under various forms of leakage attacks. To prevent the adversary from capturing the part of private keys by leakage attacks, we propose a secure leakage-resilient s-health system which realizes privacy protection and the safe transmission of medical information in the case of leakage attacks. The key technique is a promising public key cryptographic primitive called leakage-resilient anonymous Hierarchical Identity-Based Encryption. Our construction is proved to be secure against chosen plaintext attacks in the standard model under the Diffie-Hellman exponent assumption and decisional linear assumption. We also blind the public parameters and ciphertexts by using double exponent technique to achieve the recipient anonymity. Finally, the performance analysis shows the practicability of our scheme, and the leakage rate of the private key approximates to 1/6.

2019 ◽  
Vol 30 (04) ◽  
pp. 665-681
Author(s):  
Yinghui Zhang ◽  
Menglei Yang ◽  
Dong Zheng ◽  
Tiantian Zhang ◽  
Rui Guo ◽  
...  

As a promising public key cryptographic primitive, hierarchical identity-based encryption (HIBE) introduces key delegation mechanisms into identity-based encryption. However, key leakage and recipient anonymity issues have not been adequately addressed in HIBE. Hence, direct applications of traditional HIBE schemes will violate data security and abuse users’ privacy in practice. In this paper, we propose an anonymous unbounded hierarchical identity-based encryption scheme, which achieves bounded leakage resilience and the hierarchy depth is not limited. Our security proofs based on the dual system encryption technique show that the proposed scheme is capable of resisting key leakage and it realizes recipient anonymity in the standard model. In addition, leakage resilience analysis indicates that our scheme allows the leakage rate of approximate 1/3 no matter the hierarchy depth of identities. Finally, performance comparisons show the practicability of our scheme. In particular, the secret key of our construction is of a fixed-length.


2019 ◽  
Vol 63 (4) ◽  
pp. 508-524
Author(s):  
Yanwei Zhou ◽  
Bo Yang ◽  
Tao Wang ◽  
Zhe Xia ◽  
Hongxia Hou

Abstract Recently, much attention has been focused on designing provably secure cryptographic primitives in the presence of key leakage, even the continuous leakage attacks. However, several constructions on the (continuous) leakage-resilient certificate-based encryption (CBE) scheme were proposed based on the bilinear pairings, and the corresponding computational efficiency is lower. Also, the leakage on the master secret key is omitted in the previous constructions. In this paper, to further achieve the better performance, a new construction method of continuous leakage-resilient CBE scheme without bilinear pairings is proposed, and the chosen-ciphertext attacks security of designed scheme is proved based on the hardness of the classic decisional Diffie–Hellman assumption. The performance analysis shows that our method not only can obtain higher computational efficiency but also enjoys better security performances, such as the leakage parameter of secret key of user has the constant size, and an adversary cannot obtain any leakage on the secret key of user from the corresponding given ciphertext etc. The advantage is that our proposal allows leakage attacks of multiple keys, i.e. continuous leakage resilience of the secret key of user and bounded leakage resilience of the master secret key. Additionally, to provide the leakage resilience for the cloud computing, a novel data access control scheme for cloud storage service is proposed from our continuous leakage-resilient CBE scheme, which can keep its claimed security in the leakage seting.


Author(s):  
Darrell Norman Burrell ◽  
Darryl Williams ◽  
Taara Bhat ◽  
Clishia Taylor

According to the Ponemon (2012) Third Annual Benchmark Study on Patient Privacy & Data Security, 94 percent of healthcare organizations surveyed suffered at least one data breach; 45 percent experienced more than five in the past two years. Data breaches cost the U.S. healthcare industry an average of $7 billion annually (Ponemon, 2012). Electronic health records are becoming more pervasive at hospitals and clinics in the United States. Meanwhile, healthcare organizations are taking small steps toward meaningful exchange and secure data security of patient information. This has created a need for new expertise in health data security from a newly degreed and young in information security professionals from the “Millennial Generation”. This chapter explores the attraction, recruitment, and retention of younger-generation professionals with critical and emerging health information security skills.


2021 ◽  
Vol 11 (12) ◽  
pp. 2928-2936
Author(s):  
S. Vairaprakash ◽  
A. Shenbagavalli ◽  
S. Rajagopal

The biomedical processing of images is an important aspect of the modern medicine field and has an immense influence on the modern world. Automatic device assisted systems are immensely useful in order to diagnose biomedical images easily, accurately and effectively. Remote health care systems allow medical professionals and patients to work from different locations. In addition, expert advice on a patient can be received within a prescribed period of time from a specialist in a foreign country or in a remote area. Digital biomedical images must be transmitted over the network in remote healthcare systems. But the delivery of the biomedical goods entails many security challenges. Patient privacy must be protected by ensuring that images are secure from unwanted access. Furthermore, it must be effectively maintained so that nothing will affect the content of biomedical images. In certain instances, data manipulation can yield dramatic effects. A biomedical image safety method was suggested in this work. The suggested method will initially be used to construct a binary pixel encoding matrix and then to adjust matrix with the use of decimation mutation DNA watermarking principle. Afterwards to defend the sub keys couple privacy which was considered over the logical uplift utilization of tent maps and purpose. As acknowledged by chaotic (C-function) development, the security was investigated similar to transmission in addition to uncertainty. Depending on the preliminary circumstances, various numbers of random were generated intended for every map as of chaotic maps. An algorithm of Multi scale grasshopper optimization resource with correlation coefficient fitness function and PSNR was projected for choosing the optimal public key and secret key of system over random numbers. For choosing the validation process of optimization is to formulate novel model more relative stable to the conventional approach. In conclusion, the considered suggested findings were contrasted with current approaches protection that was appear to be successful extremely.


2021 ◽  
Author(s):  
Sunil Kumar ◽  
Pratik Gupta ◽  
Dharminder Dharminder

Abstract Singcryption was first proposed by Yuliang Zheng [1] in 1997, based on the construction of a shortened ElGamal-based signature scheme in parallel to authenticated encryption in a symmetric environment. Signcryption is a cryptographic primitive that enables the conventional two-step method of secure and authenticated message transmission or storage (sign-then-encrypt or encrypt-then-sign) to be done in a single step at a much lower computational cost than the traditional two-step approach. This article concentrates on designing a provably secure identity-based signcryption (IBSC) scheme. The user performs pairing-free computation during encryption in the proposed scheme, making it user-side effective. In addition, the IBSC structure is shown to be secure when dealing with modified bilinear Diffie-Hellman inversion (MBDHI) and modified bilinear strong Diffie-Hellman (MBSDH) problems. The proposed framework supports efficient communication, protection against chosen cipher attack, and existential unforgeability against chosen message attack, according to the performance review of IBSC with related schemes.


Author(s):  
Rachid Rimani ◽  
Naima Hadj Said ◽  
Adda Ali Pacha ◽  
Ozen Ozer

<span>Nowadays, with the advences in ICT and rapid development of mobile internet; media information shared on the various communication networks requires the existence of adequate security measures. Cryptography becoming an effective way to meet these requirements and for maintain the confidentiality. However, communicating with encrypted messages requires secret key exchange, which is a part of a complex protocol. In this paper, we propose a new method for exchanging key based on Diffie-Hellman protocol and image registration with fast fourier transform, the principle of this method consists to concealing the key in a set of transformed images. Therefore, image registration allows finding transformations between images, which become a tool for recovering the key by the receiver.</span>


Sign in / Sign up

Export Citation Format

Share Document