single trapdoor (instead of multiple trapdoors). Our
performance evaluation and simulation results indi-
cated that the proposed method is efficient and secure.
In future, we plan to design an trust and risk-based
auto-delegation mechanism which can respond auto-
matically to the absence of appropriately authorized
users, after finding the legitimacy of the user (based
on trust and risk value) for emergency access.
ACKNOWLEDGMENTS
The second author acknowledges the support received
from Indian Institute of Technology Jammu under the
Faculty Professional Development Grant and the first
author acknowledges the Visveswaraya PhD Support
Scheme at Sardar Vallabhbhai National Institute of
Technology, Surat.
REFERENCES
(2019). Hospital compare. available at
https://data.medicare.gov/data/hospital-compare,
accessed on February 13, 2019.
Ardagna, C. A., Di Vimercati, S. D. C., Foresti, S., Grandi-
son, T. W., Jajodia, S., and Samarati, P. (2010). Access
control for smarter healthcare using policy spaces.
Computers & Security, 29(8):848–858.
Ardagna, C. A., di Vimercati, S. D. C., Grandison, T., Ja-
jodia, S., and Samarati, P. (2008). Regulating excep-
tions in healthcare using policy spaces. In IFIP An-
nual Conference on Data and Applications Security
and Privacy, pages 254–267. Springer.
Banu, A. S. (2015). Efficient data sharing in cloud medium
with key aggregate cryptosystem. Networking and
Communication Engineering, 7(3):118–121.
Blaze, M., Bleumer, G., and Strauss, M. (1998). Divertible
protocols and atomic proxy cryptography. Advances
in Cryptology—EUROCRYPT’98, pages 127–144.
Cheon, J. H. (2006). Security analysis of the strong diffie-
hellman problem. In Advances in Cryptology - EU-
ROCRYPT 2006, pages 1–11. Springer Berlin Heidel-
berg.
Chu, C.-K., Chow, S. S., Tzeng, W.-G., Zhou, J., and Deng,
R. H. (2014). Key-aggregate cryptosystem for scal-
able data sharing in cloud storage. IEEE transactions
on parallel and distributed systems, 25(2):468–477.
Crampton, J. and Khambhammettu, H. (2008). On delega-
tion and workflow execution models. In Proceedings
of the 2008 ACM symposium on Applied computing,
pages 2137–2144. ACM.
Cui, B., Liu, Z., and Wang, L. (2016). Key-aggregate
searchable encryption (kase) for group data sharing
via cloud storage. IEEE Transactions on computers,
65(8):2374–2385.
Dang, H., Chong, Y. L., Brun, F., and Chang, E.-C. (2016).
Practical and scalable sharing of encrypted data in
cloud storage with key aggregation. In Proceedings
of the 4th ACM Workshop on Information Hiding and
Multimedia Security, pages 69–80. ACM.
De Caro, A. and Iovino, V. (2011). jpbc: Java pairing
based cryptography. In Computers and communica-
tions (ISCC), 2011 IEEE Symposium on, pages 850–
855. IEEE.
Ferreira, A., Cruz-Correia, R., Antunes, L., Farinha, P.,
Oliveira-Palhares, E., Chadwick, D. W., and Costa-
Pereira, A. (2006). How to break access control in
a controlled manner. In Computer-Based Medical
Systems, 2006. CBMS 2006. 19th IEEE International
Symposium on, pages 847–854. IEEE.
Joint, N. (2004). Break-glass: An approach to granting
emergency access to healthcare systems. COCIR/JIRA
Security And Privacy Committee (SPC).
Kiayias, A., Oksuz, O., Russell, A., Tang, Q., and Wang, B.
(2016). Efficient encrypted keyword search for multi-
user data sharing. In European Symposium on Re-
search in Computer Security, volume NA, pages 173–
195. Springer.
Li, T., Liu, Z., Jia, C., Fu, Z., and Li, J. (2018). Key-
aggregate searchable encryption under multi-owner
setting for group data sharing in the cloud. Interna-
tional Journal of Web and Grid Services, 14(1):21–43.
Li, T., Liu, Z., Li, P., Jia, C., Jiang, Z. L., and Li, J. (2016).
Verifiable searchable encryption with aggregate keys
for data sharing in outsourcing storage. In Informa-
tion Security and Privacy, pages 153–169. Springer
International Publishing.
Mahalle, R. V. and Pawade, P. P. A review of secure data
sharing in cloud using key aggregate cryptosystem
and decoy technology. International Journal of Sci-
ence and Research (IJSR), 3.
Marinovic, S., Craven, R., Ma, J., and Dulay, N. (2011).
Rumpole: a flexible break-glass access control model.
In Proceedings of the 16th ACM symposium on Access
control models and technologies, pages 73–82. ACM.
Padhya, M. and Jinwala, D. (2018). Mulkase - a novel
approach for key aggregate searchable encryption for
multi-owner data. Frontiers of Information Technol-
ogy Electronic Engineering, -1(-1).
Patranabis, S., Shrivastava, Y., and Mukhopadhyay, D.
(2015). Dynamic key-aggregate cryptosystem on el-
liptic curves for online data sharing. In Interna-
tional Conference in Cryptology in India, pages 25–
44. Springer.
Sahai, A., Waters, B., et al. (2005). Fuzzy identity-based
encryption. In Eurocrypt, volume 3494, pages 457–
473. Springer.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-based access control models. Com-
puter, 29(2):38–47.
Schaad, A. and Moffett, J. D. (2002). Delegation of obli-
gations. In Policies for Distributed Systems and Net-
works, 2002. Proceedings. Third International Work-
shop on, pages 25–35. IEEE.
Zhou, R., Zhang, X., Du, X., Wang, X., Yang, G., and
Guizani, M. (2018). File-centric multi-key aggregate
keyword searchable encryption for industrial internet
of things. IEEE Transactions on Industrial Informat-
ics.
SECRYPT 2019 - 16th International Conference on Security and Cryptography
124