Privacy-Friendly Flexible IoT Health Data Processing with User-Centric Access Control

03/01/2022
by   Khlood Jastaniah, et al.
0

This paper proposes a novel Single and Multiple user(s) data Aggregation (SAMA) scheme designed to support privacy preserving aggregation of health data collected from users' IoT wearables. SAMA also deploys a user-centric approach to support flexible fine-grain access control. It achieves this by deploying two key ideas. First, it uses multi-key Homomorphic cryptosystem (variant Paillier) to allow flexibility in accommodating both single and multi-user data processing as well as preserving the privacy of users while processing their IoT health data. Second, it uses ciphertext-policy attribute-based encryption to support flexible access control, which ensures users are able to grant data access securely and selectively. Formal security and privacy analyses have shown that SAMA supports data confidentiality and authorisation. The scheme has also been analysed in terms of computational and communication overheads to demonstrate that it is more efficient than the relevant state-of-the-art solutions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/08/2023

FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users

The federated learning (FL) technique was developed to mitigate data pri...
research
09/04/2023

Fortifying Public Safety: A Dynamic Role-Based Access Control Paradigm for Cloud-Centric IoT

The evolution of communication technologies, exemplified by the Internet...
research
08/21/2022

Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices

Millions of consumers depend on smart camera systems to remotely monitor...
research
09/10/2020

Multi-Authority Ciphertext-Policy Attribute Based Encryption With Accountability

Attribute-based encryption (ABE) is a promising tool for implementing fi...
research
01/04/2022

OConsent – Open Consent Protocol for Privacy and Consent Management with Blockchain

In the current connected world - Websites, Mobile Apps, IoT Devices coll...
research
03/06/2021

Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things

Unauthorized resource access represents a typical security threat in the...
research
11/13/2019

Enabling Opportunistic Users in Multi-Tenant IoT Systems using Decentralized Identifiers and Permissioned Blockchains

In this work, we leverage advances in decentralized identifiers and perm...

Please sign up or login with your details

Forgot password? Click here to reset