Document Type : Research Article


Faculty of Computer Engineering, Amirkabir University of Technology, Tehran, Iran


The Internet of Things has significantly improved healthcare with its promise of transforming technological, social, and economic perspectives. Medical devices with wireless internet access enable remote monitoring of patients, and collectively, these increasingly smart and connected medical devices can provide unique and contemporary medical and health services envisioned to be deployed in a large-scale fashion. For this, medical data and records generally are collected, stored, and shared through open-air wireless networks and public cloud infrastructures, which poses severe challenges regarding the confidentiality of sensitive medical data while maintaining low service overhead and system complexity. This paper presents a novel scheme for secure cloud-assisted Internet of Medical Things connecting patients/smart medical devices to smart applications/medical service providers in a scalable one-to-many fashion to make novel medical services practical. The proposed scheme uses index-based searchable encryption for data screening without decryption. It uses a low-overhead proxy re-encryption scheme for secure data sharing through public clouds


[1] S Vishnu, SR Jino Ramson, and R Jegan. Internet of medical things (iomt)-an overview. In 2020 5th international conference on devices, circuits and systems (ICDCS), pages 101–104. IEEE, 2020.
[2] Ali Ghubaish, Tara Salman, Maede Zolanvari, Devrim Unal, Abdulla Al-Ali, and Raj Jain. Recent advances in the internet-of-medical-things(iomt) systems security. IEEE Internet of Things Journal, 8(11):8707–8718, 2020.
[3] George Hatzivasilis, Othonas Soultatos, Sotiris Ioannidis, Christos Verikoukis, Giorgos Demetriou, and Christos Tsatsoulis. Review of security and privacy for the internet of medical things (iomt). In 2019 15th international conference on distributed computing in sensor systems (DCOSS), pages 457–464. IEEE, 2019.
[4] Mohammad Yaghoubi, Khandakar Ahmed, and Yuan Miao. Wireless body area network (wban): A survey on architecture, technologies, energy consumption, and security challenges. Journal of Sensor and Actuator Networks, 11(4):67, 2022.
[5] David Nu˜nez, Isaac Agudo, and Javier Lopez.Proxy re-encryption: Analysis of constructions and its application to secure access delegation. Journal of Network and Computer Applications, 87:193–209, 2017.
[6] Zhiwei Wang. Leakage resilient id-based proxy re-encryption scheme for access control in fog computing. Future Generation Computer Systems, 87:679–685, 2018.
[7] Liang Xue, Yong Yu, Yannan Li, Man Ho Au, Xiaojiang Du, and Bo Yang. Efficient attributebased encryption with attribute revocation for assured data deletion. Information Sciences, 479:640–650, 2019.
[8] Xuanmei Qin, Yongfeng Huang, Zhen Yang, and Xing Li. Lbac: A lightweight blockchain-based access control scheme for the internet of things. Information Sciences, 554:222–235, 2021.
[9] Mang Su, Bo Zhou, Anmin Fu, Yan Yu, and Gongxuan Zhang. Prta: A proxy re-encryption based trusted authorization scheme for nodes on cloudiot. Information Sciences, 527:533–547, 2020.
[10] Xiaohui Liang, Zhenfu Cao, Huang Lin, and Jun Shao. Attribute based proxy re-encryption with delegating capabilities. In Proceedings of the 4th international symposium on information, computer, and communications security, pages 276–286, 2009.
[11] Chunpeng Ge, Zhe Liu, Jinyue Xia, and Liming Fang. Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Transactions on Dependable and Secure Computing, 18(3):1214–1226, 2019.
[12] Ryuichi Sakai and Jun Furukawa. Identity-based broadcast encryption. Cryptology ePrint Archive, 2007.
[13] Cheng-Kang CHU, Jian Weng, Sherman SW Chow, Jianying Zhou, and Robert HDENG. Conditional proxy broadcast reencryption.(2009). In Information Security and Privacy: 14th Australasian Conference, ACISP, pages 1–3, 2009.
[14] Robert H Deng, Jian Weng, Shengli Liu, and Kefei Chen. Chosen-ciphertext secure proxy reencryption without pairings. In Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings 7, pages 1–17. Springer, 2008.
[15] Xu An Wang, Jianfeng Ma, and Xiaoyuan Yang. A new proxy re-encryption scheme for protecting critical information systems. Journal of Ambient Intelligence and Humanized Computing, 6:699–711, 2015.
[16] Ran Canetti and Susan Hohenberger. Chosenciphertext secure proxy re-encryption. In Proceedings of the 14th ACM conference on Computer and communications security, pages 185–194, 2007.
[17] Matthew Green and Giuseppe Ateniese. Identitybased proxy re-encryption. In Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings 5, pages 288–306. Springer,
[18] Kang Yang, Jing Xu, and Zhenfeng Zhang. Certificateless proxy re-encryption without pairings. In Information Security and Cryptology–ICISC 2013: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers 16, pages 67–88. Springer, 2014.
[19] Lei Xu, Xiaoxin Wu, and Xinwen Zhang. Cl-pre: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proceedings of the 7th ACM symposium on information, computer and communications security, pages 87–88, 2012.
[20] Chul Sur, Chae Duk Jung, Youngho Park, and Kyung Hyune Rhee. Chosen-ciphertext secure certificateless proxy re-encryption. In Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31–June 2, 2010. Proceedings 11, pages 214–232. Springer, 2010.
[21] Lawrence C Washington. Elliptic curves: number theory and cryptography. CRC press, 2008.
[22] Darrel Hankerson, S Vanstone, and A Menezes. Guide to elliptic curve cryptography. Springer Science And Business Media, 2006.
[23] Nitish Andola, Raghav Gahlot, Vijay Kumar Yadav, S Venkatesan, and Shekhar Verma. Searchable encryption on the cloud: a survey. The Journal of Supercomputing, 78(7):9952–9984, 2022.
[24] Osama A Khashan. Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment. IEEE Access, 8:66878–66887, 2020.
[25] Eman Abouelkeir. Provable lightweight hybrid proxy re-encryption scheme without pairings for internet of things. 2022.