高级搜索

脑机接口技术中安全高效的属性基访问控制

屠袁飞 杨庚 袁冯杰

引用本文: 屠袁飞, 杨庚, 袁冯杰. 脑机接口技术中安全高效的属性基访问控制[J]. 电子与信息学报, 2017, 39(10): 2495-2503. doi: 10.11999/JEIT161362 shu
Citation:  TU Yuanfei, YANG Geng, YUAN Fengjie. Secure and Efficient Attribute Based Access Control for Brain-computer Interface[J]. Journal of Electronics and Information Technology, 2017, 39(10): 2495-2503. doi: 10.11999/JEIT161362 shu

脑机接口技术中安全高效的属性基访问控制

摘要: 随着脑机接口技术(Brain-Computer Interface, BCI)在新兴医疗健康监测领域的广泛应用,其受到的安全威胁越来越多,导致其隐私保护问题受到了关注。该文针对BCI应用中的隐私保护问题提出一种通信模型,并为其设计了一种基于密文策略的属性基(Ciphertext-Policy Attribute Based Encryption, CP-ABE)访问控制方案,利用代理重加密技术实现细粒度的属性撤销。经分析表明,方案有效地解决了BCI模型中敏感数据的隐私保护问题,并且在能量损耗及通信计算开销等性能评估中表现优异。

English

    1. [1]

      WOLPAW J, BIRBAUMER N, MCFARLAND D J, et al. Brain-computer interfaces for communication and control[J]. Clinical Neurophysiology Official Journal of the International Federation of Clinical Neurophysiology, 2002, 113(6): 767-791. doi: 10.1016/S1388-2457(02)00057-3.

    2. [2]

      WOLPAW J, BIRBAUMER N, and HEETDERKS W. Brain-computer interface technology: A review of the first international meeting[J]. IEEE Transactions on Rehabilitation Engineering, 2000, 8(2): 164-173. doi: 10.1109/ TRE.2000.847807.

    3. [3]

      Abdulkader S N, ATIA A, and MOSTAFA M S M. Brain computer interfacing: Applications and challenges[J]. Egyptian Informatics Journal, 2015, 16(2): 213-230. doi: 10.1016/j.eij.2015.06.002.

    4. [4]

      BLONDET M V R, BADARINATH A, KHANNA C, et al. A wearable real-time BCI system based on mobile cloud computing[C]. International IEEE/EMBS Conference on Neural Engineering, San Diego, CA, USA, 2013: 739-742. doi: 10.1109/NER.2013.6696040.

    5. [5]

      ELSAWY A S and ELDAWLATLY S. P300-based applications for interacting with smart mobile devices[C]. International IEEE/EMBS Conference on Neural Engineering. IEEE, Montpellier, France, 2015: 166-169. doi: 10.1109/NER.2015.7146586.

    6. [6]

      HONDA K and KUDOH S N. Air brain: The easy telemetric system with smartphone for EEG signal and human behavior[C]. International Conference on Body Area Networks, Brussels, Belgium, 2013: 343-346. doi: 10.4108/ icst.bodynets.2013. 253918.

    7. [7]

      LI Q Q, DING D, and CONTI M. Brain-computer interface applications: Security and privacy challenges[C]. IEEE Communications and Network Security, Florence, Italy, 2015: 663-666. doi: 10.1109/CNS.2015.7346884.

    8. [8]

      MARTINOVIC I, DAVIES D, FRANK M, et al. On the feasibility of side-channel attacks with brain-computer interfaces[C]. Usenix Conference on Security Symposium, Berkeley CA USA, 2012: 34.

    9. [9]

      LUBER B, FISHER C, APPELBAUM P S, et al. Non- invasive brain stimulation in the detection of deception: scientific challenges and ethical consequences[J]. Behavioral Sciences the Law, 2009, 27(2): 191-208. doi: 10.1002/bsl. 860.

    10. [10]

      U.S. Centers for Medicare Medicaid Services. Hippa basics for providers: privacy, security, and breach notification rules[OL]. https://www.cms.gov/Outreach-and-Education/ Medicare-Learning-Network-MLN/MLNProducts/Downloads/HIPAAPrivacyandSecurityTextOnly.pdf. 2016.

    11. [11]

      U.S. Federal Trade Commission. Federal trade commission act[OL]. https://www.ftc.gov/enforcement/statutes/federal- trade-commission-act.Apr.12, 2015.

    12. [12]

      CHIZECK H J and BONACI T. Brain-computer interface anonymizer[OL]. https://docs.google.com/viewer?url= patentimages.storage.googleapis.com/pdfs/US20140228701.pdf. Aug.14, 2014.

    13. [13]

      BONACI T, CALO R, and CHIZECK H. App stores for the brain: privacy and security in brain-computer interfaces[J]. Technology Society Magazine IEEE, 2015, 34(2): 32-39. doi: 10.1109/MTS.2015.2425551.

    14. [14]

      VENKATASUBRAMANIAN K K, BANERIEE A, and GUPTA S K S. EKG-based key agreement in body sensor networks[C]. INFOCOM Workshops. IEEE, Phoenix, AZ, USA, 2008: 1-6. doi: 10.1109/INFOCOM.2008.4544608.

    15. [15]

      CHERUKURI S, VENKATASUBRAMANIAN K K, and GUPTA S K S. BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body[C]. International Conference on Parallel Processing Workshops, Kaohsiung, 2003: 432-439. doi: 10.1109/ICPPW.2003.1240399.

    16. [16]

      TAN C C, WANG H, ZHONG S, et al. Body sensor network security: An identity-based cryptography approach[C]. ACM Conference on Wireless Network Security, Alexandria, VA, USA, 2008: 148-153. doi: 10.1145/1352533.1352557.

    17. [17]

      MALEK B and MIRI A. Combining attribute-based and access systems[C]. 2009 International Conference on Computational Science and Engineering, Vancouver, BC, Canada, 2009, 3: 305-312. doi: 10.1109/CSE.2009.157.

    18. [18]

      HAN R F, WANG H X, XIAO Q, et al. A united access control model for systems in collaborative commerce[J]. Journal of Networks, 2009, 4(4): 279-289. doi: 10.4304/jnw. 4.4.279-289.

    19. [19]

      WAN Z, LIU J, and DENG R H. HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing[J]. IEEE Transactions on Information Forensics Security, 2012, 7(2): 743-754. doi: 10.1109/TIFS.2011.2172209.

    20. [20]

      GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C]. ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 2006: 89-98. doi: 10.1145/1180405.1180418.

    21. [21]

      冯登国, 陈成. 属性密码学研究[J]. 密码学报, 2014, 1(1): 1-12. doi: 10.13868/j.cnki.jcr.000001.

    22. [22]

      FENG Dengguo and CHEN Cheng. Research on attribute- based cryptography[J]. Journal of Cryptologic Research, 2014, 1(1): 1-12. doi: 10.13868/j.cnki.jcr.000001.

    23. [23]

      YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[C]. ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, 2010: 261-270. doi: 10.1145/ 1755688.1755720.

    24. [24]

      NARUSE T, MOHRI M, and SHIRAISHI Y. Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating[J]. Human-centric Computing and Information Sciences, 2015, 5(1): 1-13. doi: 10.1186/s13673-015-0027-0.

    25. [25]

      WANDER A S, GURA N, EBERLE H, et al. Energy analysis of public-key cryptography for wireless sensor networks[C]. Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, Kauai Island, HI, USA, 2005: 324-331. doi: 10.1109/PERCOM.2005.18.

    26. [26]

      REN Kui, ZENG Kai, LOU Wenjing, et al. On broadcast authentication in wireless sensor networks[C]. International Conference on Wireless Algorithms, Systems, and Applications, Xian, China, 2006: 502-514. doi: 10.1007/ 11814856_48.

    1. [1]

      孙瑾, 王小静, 王尚平, 任利利. 支持属性撤销的可验证多关键词搜索加密方案. 电子与信息学报, 2019, 41(1): 53-60.

    2. [2]

      刘振华, 周佩琳, 段淑红. 支持关键词搜索的属性代理重加密方案. 电子与信息学报, 2018, 40(3): 683-689.

    3. [3]

      张玉磊, 文龙, 王浩浩, 张永洁, 王彩芬. 多用户环境下无证书认证可搜索加密方案. 电子与信息学报, 2020, 42(0): 1-8.

    4. [4]

      冯登国, 张敏, 叶宇桐. 基于差分隐私模型的位置轨迹发布技术研究. 电子与信息学报, 2020, 42(1): 74-88.

    5. [5]

      杨立君, 丁超, 吴蒙. 一种同时保障隐私性与完整性的无线传感器网络可恢复数据聚合方案. 电子与信息学报, 2015, 37(12): 2808-2814.

    6. [6]

      朱小玉, 刘琴, 王国军. 云存储中一种支持可验证的模糊查询加密方案. 电子与信息学报, 2017, 39(7): 1741-1747.

    7. [7]

      江明明, 郭宇燕, 余磊, 宋万干, 魏仕民. 有效的标准模型下格上基于身份的代理重加密. 电子与信息学报, 2019, 41(1): 61-66.

    8. [8]

      李雪莲, 王海玉, 高军涛, 李伟. 一种匿名可撤销的比特币混淆方案. 电子与信息学报, 2019, 41(8): 1815-1822.

    9. [9]

      彭志宇, 李善平. 移动环境下LBS位置隐私保护. 电子与信息学报, 2011, 33(5): 1211-1216.

    10. [10]

      张强, 王国军. 个性化搜索中一种基于位置服务的隐私保护方法. 电子与信息学报, 2018, 40(8): 1998-2005.

    11. [11]

      葛国栋, 郭云飞, 刘彩霞, 兰巨龙. 内容中心网络中面向隐私保护的协作缓存策略. 电子与信息学报, 2015, 37(5): 1220-1226.

    12. [12]

      罗恩韬, 王国军. 移动社交网络中一种朋友发现的隐私安全保护策略. 电子与信息学报, 2016, 38(9): 2165-2172.

    13. [13]

      陈爱国, 王士同. 具有隐私保护功能的知识迁移聚类算法. 电子与信息学报, 2016, 38(3): 523-531.

    14. [14]

      戴华, 秦小麟, 刘亮, 季一木, 付雄, 孙研. 基于Z-O编码的两层WSNs隐私保护最值查询处理协议. 电子与信息学报, 2013, 35(4): 970-976.

    15. [15]

      赵星, 彭建华, 游伟. 基于Lyapunov优化的隐私感知计算卸载方法. 电子与信息学报, 2019, 41(0): 1-8.

    16. [16]

      石乐义, 贾聪, 宫剑, 刘昕, 陈鸿龙. 基于共享秘密的伪随机散列函数RFID双向认证协议. 电子与信息学报, 2016, 38(2): 361-366.

    17. [17]

      曹素珍, 王斐, 郎晓丽, 汪锐, 刘雪艳. 基于无证书的多方合同签署协议. 电子与信息学报, 2019, 41(11): 2691-2698.

    18. [18]

      周治平, 李智聪. 无可信第三方的数据匿名化收集协议. 电子与信息学报, 2019, 41(6): 1442-1449.

    19. [19]

      王尚平, 余小娟, 张亚玲. 具有两个可撤销属性列表的密钥策略的属性加密方案. 电子与信息学报, 2016, 38(6): 1406-1411.

    20. [20]

      赵志远, 朱智强, 王建华, 孙磊. 云存储环境下无密钥托管可撤销属性基加密方案研究. 电子与信息学报, 2018, 40(1): 1-10.

  • 加载中
计量
  • PDF下载量:  200
  • 文章访问数:  301
  • HTML全文浏览量:  18
文章相关
  • 收稿日期:  2016-12-13
  • 录用日期:  2017-07-11
  • 刊出日期:  2017-10-19
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

/

返回文章