A Combined Approach of Identity Based and Attribute Based Encryption Service to Secure Data Processing in WBAN

Authors

  • Manish Shrivastava, Princy Matlani

Keywords:

Cloud storage, cipher text, encryption, access control, attribute-based encryption, constant cipher text length, decryption, cryptography.

Abstract

Wireless Body Area Network (WBAN) is a collection of wireless sensor nodes that can be placed inside or outside the body of a human or living person to observe or monitor the functionality and adjacent situations of the body. By using a wireless body network, the patient becomes more physically versatile and is no longer forced to stay in the hospitals. Cloud computing is the next big thing after the Internet in WBAN. Even though cloud is becoming more popular, ease of use and respectability, privacy issues and other security issues is a big setback in the field of cloud computing. Privacy and security are the key factors for cloud storage. Encryption is a prominent technology for protecting sensitive data. In this paper, a combined approach of identity-based and attribute-based access policy for encryption (CAIBABE) of cloud storage is proposed, which can be implemented on a cloud platform. In this work, the feasibility of the encryption algorithm for data security and privacy in cloud storage is analyzed in comparison with other existing algorithms.

Downloads

Download data is not yet available.

References

Zhiping Cai, Yangyang Li, Wencheng Sun, Fang Liu, Shengqun Fang and Guoyan Wang, “Security and Privacy in the Medical Internet of Things: A Review,” Journal of Security and Communication Networks, pp. 1-9 2018.

Omala, A.A., Mbandu, A.S., Mutiria, K.D. et al., “Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network,” J Med Syst , vol. 42,no. 108, 2018.

C. Ma and M. Li, R. Du, "Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains," inTsinghua Science and Technology, February 2023, vol. 28, no. 1, pp. 13-26,doi: 10.26599/TST.2021.9010070.

K. R and K. B, "Privacy Preserving Security Integrating Method with Varying Key Encryption Model in Cloud,"2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), pp. 1-9, 2022 ; doi: 10.1109/ ICSES55317.2022.9914177.

Y. Miao ,Y. Yang , K. -K. R. Choo and R. H. Deng, "Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data,"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS), pp. 392-402, 2022, doi: 10.1109/ICDCS54860. 2022.00045.

W. Yang, Y. Zhu ,X. Ma and Z. Bai, "A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing,"2022 IEEE International Performance, Computing, and Communications Conference (IPCCC), pp. 194-201, 2022, doi: 10.1109/IPCCC55026.2022.9894331.

Z. Li, H. Wang and H. Fang , "Group-Based Cooperation on Symmetric Key Generation for WirelessBodyAreaNetworks,"inIEEEInternetofThingsJournal,vol.4,no.6,pp,1955-1963, Dec. 2017, doi: 10.1109/JIOT.2017.2761700.

A. Nabila and E. B. Mohamedand, "A QoS based comparative analysis of the IEEE standards 802.15.4 & 802.15.6 in WBAN-based healthcare monitoring systems,"2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), , 2019, pp. 1-5,doi: 10.1109/WITS.2019.8723709.

H. Su, J. Liu ,X. Yuan, H. Tian, H. Wang, and A. Taherkordi, "Edge-Enabled WBANs for Efficient QoS Provisioning Healthcare Monitoring: A Two-Stage Potential Game-Based Computation Offloading Strategy," inIEEE Access, 2020,vol. 8, pp. 92718-92730, doi: 10.1109/ACCESS. 2020.2992639.

A.Tripathi and D. Yadav, "Load balancing and position based adaptive clustering scheme for effective data communication in WBAN healthcare monitoring systems,"2017 11th International Conference on Intelligent Systems and Control (ISCO), 2017, pp. 302-305, doi: 10.1109/ISCO.2017.7856003.

J. Loane, F. McCaffery ,P. C. Paul, and G. Regan, "A Data Security And Privacy Risk Management Framework For WBAN Based Healthcare Applications*,"2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), pp. 704-710, 2021, doi: 10.1109/PerComWorkshops51409.2021.9431069.

Y. Zhong ,S. Ma and Q. Huang, "Efficient Public Key Encryption with Outsourced Equality Test for Cloud-based IoT environments," in IEEE Transactions on Information Forensics and Security, 2022, doi: 10.1109/TIFS.2022.3212203.

A. Catalfamo, A. Celesti, M. Fazio and M. Villari, "A Homomorphic Encryption Service to Secure Data Processing in a Cloud/Edge Continuum Context,"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud), 2022, pp. 55-61, doi: 10.1109/FiCloud 57274. 2022.00015.

Downloads

Published

15.11.2023

How to Cite

Manish Shrivastava. (2023). A Combined Approach of Identity Based and Attribute Based Encryption Service to Secure Data Processing in WBAN. International Journal of Intelligent Systems and Applications in Engineering, 11(11s), 830–836. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7666

Issue

Section

Research Article