A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring

Ren Wei, Yi Ren, Mu-En Wu, Chia-Jung Lee

    Research output: Contribution to conferencePaperpeer-review

    9 Scopus citations

    Abstract

    Cloud computing paradigm is becoming very popular these days. However, it does not include wireless sensors and mobile phones which are needed to enable new emerging applications such as remote home medical monitoring. Therefore, a combined Cloud-Internet of Things (IoT) paradigm provides scalable on-demand data storage and resilient computation power at the cloud side as well as anytime, anywhere health data monitoring at the IoT side. As both the privacy of personal medical data and flexible data access should be provided, the data in the Cloud are always encrypted and access control must be operated upon encrypted data together with being fine-grained to support diverse accessibility. Since a plain combination of encryption before access control is not robust and flexible, we propose a scheme with tailored design. The scheme makes use of cipher-policy attributes based encryption to empower robustness and flexibility. The scheme describes a general framework to solve the secure requirements, and leaves the flexibility of concrete constructions intentionally.
    Original languageEnglish
    Pages130-133
    Number of pages4
    DOIs
    StatePublished - 2015
    Event3rd International Conference on Robot, Vision and Signal Processing, RVSP 2015 - Kaohsiung, Taiwan
    Duration: 18 Nov 201520 Nov 2015

    Conference

    Conference3rd International Conference on Robot, Vision and Signal Processing, RVSP 2015
    Country/TerritoryTaiwan
    CityKaohsiung
    Period18/11/1520/11/15

    Keywords

    • Access Control; Internet of Things; Cloud Computing; Robust and Flexible Security

    Fingerprint

    Dive into the research topics of 'A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring'. Together they form a unique fingerprint.

    Cite this