{"title":"面向物联网云环境下外包健康数据的隐私和所有权保护","authors":"Youcef Ould-Yahia, S. Bouzefrane, H. Boucheneb","doi":"10.1109/ISPS.2018.8379018","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a novel data-owner centric privacy model for in-home-monitoring applications, that implements a promising attribute-based encryption (ABE) to reinforce the data-owner access control and the security of anonymous data access. This proposed protocol avoids threats from curious cloud service providers. Unlike other schemes that implement ABE by outsourcing the heavy computational tasks such as encryption and decryption processes, we propose a framework in which we externalize the complete ABE-encryption algorithms to avoid complex outsourcing process and use well know efficient symmetric encryption in constrained devices. We have performed an experimental analysis to show how much gain allows such offloading.","PeriodicalId":294761,"journal":{"name":"2018 International Symposium on Programming and Systems (ISPS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Towards privacy and ownership preserving of outsourced health data in IoT-cloud context\",\"authors\":\"Youcef Ould-Yahia, S. Bouzefrane, H. Boucheneb\",\"doi\":\"10.1109/ISPS.2018.8379018\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a novel data-owner centric privacy model for in-home-monitoring applications, that implements a promising attribute-based encryption (ABE) to reinforce the data-owner access control and the security of anonymous data access. This proposed protocol avoids threats from curious cloud service providers. Unlike other schemes that implement ABE by outsourcing the heavy computational tasks such as encryption and decryption processes, we propose a framework in which we externalize the complete ABE-encryption algorithms to avoid complex outsourcing process and use well know efficient symmetric encryption in constrained devices. We have performed an experimental analysis to show how much gain allows such offloading.\",\"PeriodicalId\":294761,\"journal\":{\"name\":\"2018 International Symposium on Programming and Systems (ISPS)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Symposium on Programming and Systems (ISPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPS.2018.8379018\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Symposium on Programming and Systems (ISPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPS.2018.8379018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards privacy and ownership preserving of outsourced health data in IoT-cloud context
In this paper, we propose a novel data-owner centric privacy model for in-home-monitoring applications, that implements a promising attribute-based encryption (ABE) to reinforce the data-owner access control and the security of anonymous data access. This proposed protocol avoids threats from curious cloud service providers. Unlike other schemes that implement ABE by outsourcing the heavy computational tasks such as encryption and decryption processes, we propose a framework in which we externalize the complete ABE-encryption algorithms to avoid complex outsourcing process and use well know efficient symmetric encryption in constrained devices. We have performed an experimental analysis to show how much gain allows such offloading.