Service aggregation has exhibited useful features for efficient and reliable services, especially... more Service aggregation has exhibited useful features for efficient and reliable services, especially for the Internet. Recent advances of service aggregation pose a new challenge to privacy policy management due to the nature of policy aggregation and policy inconsistency. Previous studies in privacy policies do not capture privacy issues in service aggregation. In this paper, we present a formal result to demonstrate privacy policy aggregation. In particular, we show how to implement privacy policy aggregation with Platform for Privacy Preferences (P3P).
Service-Oriented Architecture enables service combination and makes it possible to develop new se... more Service-Oriented Architecture enables service combination and makes it possible to develop new services in a cost-effective and time-efficient way. As a service combiner, All-in-One e-Health Service, which is described in this paper, empowers e-health organizations and consumers through embracing a holistic paradigm in which consumers, intermediaries, and e-health service providers establish on-demand interactions, to obtain services. In this paper, we investigate the security and privacy issues in the All-in-One e-Health Service model, which include authentication, authorization, identity management, data confidentiality and integrity, and privacy, propose four authentication protocols, and give an analysis comparison on our proposed protocols with two protocols available in the market.
IEEE journal of biomedical and health informatics, Jan 25, 2018
Attribute-based encryption has been a promising encryption technology to secure personal health r... more Attribute-based encryption has been a promising encryption technology to secure personal health records (PHRs) sharing in cloud computing. PHRs consist of the patient data often collected from various sources including hospitals and general practice centres. Different patients' access policies have a common access sub-policy. In this paper, we propose a novel attribute-based encryption scheme for fine-grained and flexible access control to PHRs data in cloud computing. The scheme generates shared information by the common access sub-policy which is based on different patients' access policies. Then the scheme combines the encryption of PHRs from different patients. Therefore, both time consumption of encryption and decryption can be reduced. Medical staff require varying levels of access to PHRs. The proposed scheme can also support multi-privilege access control so that medical staff can access the required level of information while maximizing patient privacy. Through impl...
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2019
Attribute-based encryption has been a promising encryption technology to secure personal health r... more Attribute-based encryption has been a promising encryption technology to secure personal health records (PHRs) sharing in cloud computing. PHRs consist of the patient data often collected from various sources including hospitals and general practice centres. Different patients' access policies have a common access sub-policy. In this paper, we propose a novel attribute-based encryption scheme for fine-grained and flexible access control to PHRs data in cloud computing. The scheme generates shared information by the common access sub-policy, which is based on different patients' access policies. Then, the scheme combines the encryption of PHRs from different patients. Therefore, both time consumption of encryption and decryption can be reduced. Medical staff require varying levels of access to PHRs. The proposed scheme can also support multi-privilege access control so that medical staff can access the required level of information while maximizing patient privacy. Through implementation and simulation, we demonstrate that the proposed scheme is efficient in terms of time. Moreover, we prove the security of the proposed scheme based on security of the ciphertext-policy attribute-based encryption scheme.
—This paper presents a novel access control scheme for personal health record(PHR) data in cloud ... more —This paper presents a novel access control scheme for personal health record(PHR) data in cloud computing. The scheme utilizes attribute-based encryption(ABE), hash function and symmetric encryption to realize a fine-grained, multi-privilege access control to PHR. The patients can share their PHR with medical staff from various departments with different privileges securely. The experimental results show the efficiency of our scheme in terms of running-time, communication cost and storage overhead.
Abstract Large volumes of textual news data are produced in milliseconds by media companies, such... more Abstract Large volumes of textual news data are produced in milliseconds by media companies, such as Thomson Reuters, Wall Street Journal, Financial Times and many others. This paper discusses the needs for processing such news data, the challenges ...
Abstract. We consider the following problem: members in a dynamic group retrieve their encrypted ... more Abstract. We consider the following problem: members in a dynamic group retrieve their encrypted data from an untrusted server based on keywords and without any loss of data confidentiality and member's pri-vacy. In this paper, we investigate common secure indices for ...
Abstract. We consider the following problem: users in a dynamic group store their encrypted docum... more Abstract. We consider the following problem: users in a dynamic group store their encrypted documents on an untrusted server, and wish to re-trieve documents containing some keywords without any loss of data con-fidentiality. In this paper, we investigate common secure ...
AbstractService aggregation is becoming a cost-effective and time-efficient way for a business t... more AbstractService aggregation is becoming a cost-effective and time-efficient way for a business to develop new applications and services. While it creates tremendous opportunities in various industry sectors, its cross-organization nature raises serious challenges in the security ...
… of the 9th international conference on …, Jan 1, 2007
Abstract. A dynamic accumulator is an algorithm, which gathers to-gether a large set of elements ... more Abstract. A dynamic accumulator is an algorithm, which gathers to-gether a large set of elements into a constant-size value such that for a given element accumulated, there is a witness confirming that the el-ement was indeed included into the value, with a property that accu-mulated ...
A dynamic accumulator is an algorithm, which merges a large set of elements into a constant-size ... more A dynamic accumulator is an algorithm, which merges a large set of elements into a constant-size value such that for an element accumulated, there is a witness confirming that the element was included into the value, with a prop-erty that accumulated elements can be ...
AbstractWith a rapid growth of the Internet, exploring cost-effective and time-efficient methods... more AbstractWith a rapid growth of the Internet, exploring cost-effective and time-efficient methods for creating Internet services has become critical. As an emerging technology, service aggregation has been regarded as a promising candidate. However, it also raises serious issues on ...
Service aggregation has exhibited useful features for efficient and reliable services, especially... more Service aggregation has exhibited useful features for efficient and reliable services, especially for the Internet. Recent advances of service aggregation pose a new challenge to privacy policy management due to the nature of policy aggregation and policy inconsistency. Previous studies in privacy policies do not capture privacy issues in service aggregation. In this paper, we present a formal result to demonstrate privacy policy aggregation. In particular, we show how to implement privacy policy aggregation with Platform for Privacy Preferences (P3P).
Service-Oriented Architecture enables service combination and makes it possible to develop new se... more Service-Oriented Architecture enables service combination and makes it possible to develop new services in a cost-effective and time-efficient way. As a service combiner, All-in-One e-Health Service, which is described in this paper, empowers e-health organizations and consumers through embracing a holistic paradigm in which consumers, intermediaries, and e-health service providers establish on-demand interactions, to obtain services. In this paper, we investigate the security and privacy issues in the All-in-One e-Health Service model, which include authentication, authorization, identity management, data confidentiality and integrity, and privacy, propose four authentication protocols, and give an analysis comparison on our proposed protocols with two protocols available in the market.
IEEE journal of biomedical and health informatics, Jan 25, 2018
Attribute-based encryption has been a promising encryption technology to secure personal health r... more Attribute-based encryption has been a promising encryption technology to secure personal health records (PHRs) sharing in cloud computing. PHRs consist of the patient data often collected from various sources including hospitals and general practice centres. Different patients' access policies have a common access sub-policy. In this paper, we propose a novel attribute-based encryption scheme for fine-grained and flexible access control to PHRs data in cloud computing. The scheme generates shared information by the common access sub-policy which is based on different patients' access policies. Then the scheme combines the encryption of PHRs from different patients. Therefore, both time consumption of encryption and decryption can be reduced. Medical staff require varying levels of access to PHRs. The proposed scheme can also support multi-privilege access control so that medical staff can access the required level of information while maximizing patient privacy. Through impl...
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2019
Attribute-based encryption has been a promising encryption technology to secure personal health r... more Attribute-based encryption has been a promising encryption technology to secure personal health records (PHRs) sharing in cloud computing. PHRs consist of the patient data often collected from various sources including hospitals and general practice centres. Different patients' access policies have a common access sub-policy. In this paper, we propose a novel attribute-based encryption scheme for fine-grained and flexible access control to PHRs data in cloud computing. The scheme generates shared information by the common access sub-policy, which is based on different patients' access policies. Then, the scheme combines the encryption of PHRs from different patients. Therefore, both time consumption of encryption and decryption can be reduced. Medical staff require varying levels of access to PHRs. The proposed scheme can also support multi-privilege access control so that medical staff can access the required level of information while maximizing patient privacy. Through implementation and simulation, we demonstrate that the proposed scheme is efficient in terms of time. Moreover, we prove the security of the proposed scheme based on security of the ciphertext-policy attribute-based encryption scheme.
—This paper presents a novel access control scheme for personal health record(PHR) data in cloud ... more —This paper presents a novel access control scheme for personal health record(PHR) data in cloud computing. The scheme utilizes attribute-based encryption(ABE), hash function and symmetric encryption to realize a fine-grained, multi-privilege access control to PHR. The patients can share their PHR with medical staff from various departments with different privileges securely. The experimental results show the efficiency of our scheme in terms of running-time, communication cost and storage overhead.
Abstract Large volumes of textual news data are produced in milliseconds by media companies, such... more Abstract Large volumes of textual news data are produced in milliseconds by media companies, such as Thomson Reuters, Wall Street Journal, Financial Times and many others. This paper discusses the needs for processing such news data, the challenges ...
Abstract. We consider the following problem: members in a dynamic group retrieve their encrypted ... more Abstract. We consider the following problem: members in a dynamic group retrieve their encrypted data from an untrusted server based on keywords and without any loss of data confidentiality and member's pri-vacy. In this paper, we investigate common secure indices for ...
Abstract. We consider the following problem: users in a dynamic group store their encrypted docum... more Abstract. We consider the following problem: users in a dynamic group store their encrypted documents on an untrusted server, and wish to re-trieve documents containing some keywords without any loss of data con-fidentiality. In this paper, we investigate common secure ...
AbstractService aggregation is becoming a cost-effective and time-efficient way for a business t... more AbstractService aggregation is becoming a cost-effective and time-efficient way for a business to develop new applications and services. While it creates tremendous opportunities in various industry sectors, its cross-organization nature raises serious challenges in the security ...
… of the 9th international conference on …, Jan 1, 2007
Abstract. A dynamic accumulator is an algorithm, which gathers to-gether a large set of elements ... more Abstract. A dynamic accumulator is an algorithm, which gathers to-gether a large set of elements into a constant-size value such that for a given element accumulated, there is a witness confirming that the el-ement was indeed included into the value, with a property that accu-mulated ...
A dynamic accumulator is an algorithm, which merges a large set of elements into a constant-size ... more A dynamic accumulator is an algorithm, which merges a large set of elements into a constant-size value such that for an element accumulated, there is a witness confirming that the element was included into the value, with a prop-erty that accumulated elements can be ...
AbstractWith a rapid growth of the Internet, exploring cost-effective and time-efficient methods... more AbstractWith a rapid growth of the Internet, exploring cost-effective and time-efficient methods for creating Internet services has become critical. As an emerging technology, service aggregation has been regarded as a promising candidate. However, it also raises serious issues on ...
Uploads
Papers