A Combined Approach of Identity Based and Attribute Based Encryption Service to Secure Data Processing in WBAN
Keywords:
Cloud storage, cipher text, encryption, access control, attribute-based encryption, constant cipher text length, decryption, cryptography.Abstract
Wireless Body Area Network (WBAN) is a collection of wireless sensor nodes that can be placed inside or outside the body of a human or living person to observe or monitor the functionality and adjacent situations of the body. By using a wireless body network, the patient becomes more physically versatile and is no longer forced to stay in the hospitals. Cloud computing is the next big thing after the Internet in WBAN. Even though cloud is becoming more popular, ease of use and respectability, privacy issues and other security issues is a big setback in the field of cloud computing. Privacy and security are the key factors for cloud storage. Encryption is a prominent technology for protecting sensitive data. In this paper, a combined approach of identity-based and attribute-based access policy for encryption (CAIBABE) of cloud storage is proposed, which can be implemented on a cloud platform. In this work, the feasibility of the encryption algorithm for data security and privacy in cloud storage is analyzed in comparison with other existing algorithms.
Downloads
References
Zhiping Cai, Yangyang Li, Wencheng Sun, Fang Liu, Shengqun Fang and Guoyan Wang, “Security and Privacy in the Medical Internet of Things: A Review,” Journal of Security and Communication Networks, pp. 1-9 2018.
Omala, A.A., Mbandu, A.S., Mutiria, K.D. et al., “Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network,” J Med Syst , vol. 42,no. 108, 2018.
C. Ma and M. Li, R. Du, "Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains," inTsinghua Science and Technology, February 2023, vol. 28, no. 1, pp. 13-26,doi: 10.26599/TST.2021.9010070.
K. R and K. B, "Privacy Preserving Security Integrating Method with Varying Key Encryption Model in Cloud,"2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), pp. 1-9, 2022 ; doi: 10.1109/ ICSES55317.2022.9914177.
Y. Miao ,Y. Yang , K. -K. R. Choo and R. H. Deng, "Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data,"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS), pp. 392-402, 2022, doi: 10.1109/ICDCS54860. 2022.00045.
W. Yang, Y. Zhu ,X. Ma and Z. Bai, "A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing,"2022 IEEE International Performance, Computing, and Communications Conference (IPCCC), pp. 194-201, 2022, doi: 10.1109/IPCCC55026.2022.9894331.
Z. Li, H. Wang and H. Fang , "Group-Based Cooperation on Symmetric Key Generation for WirelessBodyAreaNetworks,"inIEEEInternetofThingsJournal,vol.4,no.6,pp,1955-1963, Dec. 2017, doi: 10.1109/JIOT.2017.2761700.
A. Nabila and E. B. Mohamedand, "A QoS based comparative analysis of the IEEE standards 802.15.4 & 802.15.6 in WBAN-based healthcare monitoring systems,"2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), , 2019, pp. 1-5,doi: 10.1109/WITS.2019.8723709.
H. Su, J. Liu ,X. Yuan, H. Tian, H. Wang, and A. Taherkordi, "Edge-Enabled WBANs for Efficient QoS Provisioning Healthcare Monitoring: A Two-Stage Potential Game-Based Computation Offloading Strategy," inIEEE Access, 2020,vol. 8, pp. 92718-92730, doi: 10.1109/ACCESS. 2020.2992639.
A.Tripathi and D. Yadav, "Load balancing and position based adaptive clustering scheme for effective data communication in WBAN healthcare monitoring systems,"2017 11th International Conference on Intelligent Systems and Control (ISCO), 2017, pp. 302-305, doi: 10.1109/ISCO.2017.7856003.
J. Loane, F. McCaffery ,P. C. Paul, and G. Regan, "A Data Security And Privacy Risk Management Framework For WBAN Based Healthcare Applications*,"2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), pp. 704-710, 2021, doi: 10.1109/PerComWorkshops51409.2021.9431069.
Y. Zhong ,S. Ma and Q. Huang, "Efficient Public Key Encryption with Outsourced Equality Test for Cloud-based IoT environments," in IEEE Transactions on Information Forensics and Security, 2022, doi: 10.1109/TIFS.2022.3212203.
A. Catalfamo, A. Celesti, M. Fazio and M. Villari, "A Homomorphic Encryption Service to Secure Data Processing in a Cloud/Edge Continuum Context,"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud), 2022, pp. 55-61, doi: 10.1109/FiCloud 57274. 2022.00015.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.