Abstract
Hierarchical access control key management is a technique that involves grouping users into several categories such that each group has a distinct level of authority, thereby reducing the inconvenience that users and administrators face in storing and managing keys. The primary objective of the key management scheme is to distribute keys efficiently and manage them dynamically. Several hierarchical access control key management schemes have recently been proposed to protect e-medicine systems' security. However, these schemes often have security vulnerabilities or require significant storage space and computation. As the hospital organizational structure differs from the standard hierarchical structure, the current hierarchical access control scheme cannot fully leverage the original access control scheme's benefits. Recently, enhanced Chebyshev chaotic maps have shown superiority over traditional cryptographic systems that use modular exponent operations, exhibiting semi-group and commutative properties. This study proposes a secure and efficient key management scheme for e-medical systems using enhanced Chebyshev chaotic maps. Compared with related schemes, the proposed scheme addresses previous security limitations and outperforms other schemes in terms of functionality and performance.
Similar content being viewed by others
Data availability
No datasets were analyzed or generated during the course of the current study.
References
Akl SG, Taylor PD (1983) Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst 1(3):239–248
Jeng FG, Wang CM (2006) An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. J Syst Softw 79(8):1161–1167
Chung YF, Lee HH, Lai F, Chen TS (2008) Access control in user hierarchy based on elliptic curve cryptosystem. Inf Sci 178(1):230–243
Edmund LCS, Ramaiah CK, Gulla SP (2009) Electronic medical records management systems: An overview. DESIDOC J Libr Inf Technol 29(6):3
Heart T, Ben-Assuli O, Shabtai I (2017) A review of PHR, EMR and EHR integration: A more personalized healthcare and public health policy. Health Policy Technol 6(1):20–25
Lee TF, Chang IP, Su GJ (2023) Compliance with HIPAA and GDPR in certificateless-based authenticated key agreement using extended chaotic maps. Electronics 12(5):1108
Nikooghadam M, Zakerolhosseini A, Moghaddam ME (2010) Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J Syst Softw 83(10):1917–1929
Wu S, Chen K (2011) An efficient key-management scheme for hierarchical access control in E-Medicine system. J Med Syst 36(4):2325–2337
Nikooghadam M, Zakerolhosseini A (2012) Secure communication of medical information using mobile agents. J Med Syst 36(6):3839–3850
Hassen HR, Bettahar H, Bouadbdallah A, Challal Y (2012) An efficient key management scheme for content access control for linear hierarchies. Comput Netw 56(8):2107–2118
Das AK, Paul NY, Tripathy L (2012) Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Inf Sci 209(20):80–92
Odelu V, Das AK, Goswami A (2013) An effective and secure key-management scheme for hierarchical access control in e-medicine system. J Med Syst 37(2)
Chao WY, Tsai CY, Hwang MS (2017) An improved key-management scheme for hierarchical access control. Int J Netw Secur 19(4):639–643
Sivasundari A, Ramakrishnan M (2018) Hybrid PRNS version of elliptic curve cryptography with signcryption based security enhancement technique for dynamic key management system. J Comput Theor Nanosci 15(1):299–310
Lin YL, Hsu CL (2011) Secure key management scheme for dynamic hierarchical access control based on ECC. J Syst Softw 84(4):679–685
Xing Q, Wang B, Wang X, Chen P, Yu B, Tang Y, Gao X (2016) Unbounded revocable hierarchical identity-based encryption with adaptive-id security. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 430–437). IEEE
Pareek G, Purushothama BR (2019) Extended hierarchical key assignment scheme (E-HKAS): how to efficiently enforce explicit policy exceptions in dynamic hierarchies. Sādhanā 44(12):235
Abi-Char PE, Nader P, Mahfouz S (2021) A secure key management scheme for hierarchical access control with secret key validity checking. In: 2021 44th International Conference on Telecommunications and Signal Processing (TSP) (pp 27–33). IEEE
Xiao D, Liao XO, Deng SJ (2008) Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf Sci 178(6):1598–1602
Niu YJ, Wang XY (2011) An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 16(4):1986–1992
Xue KP, Hong PL (2012) Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 17(7):2969–2977
Lee CC, Hsu SW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1–2):201–211
Lee CC, Chen CL, Wu CY, Huang SY (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1–2):79–87
Wang X, Zhao JF (2010) An improved key agreement protocol based on chaos. Commun Nonlinear Sci Numer Simul 15(12):4052–4057
Guo XF, Zhang JS (2010) Secure group key agreement protocol based on chaotic Hash. Inf Sci 180(20):4069–4074
Guo C, Chang CC (2013) Chaotic maps-based password-authenticated key agreement using smart cards. Commun Nonlinear Sci Numer Simul 18(6):1433–1440
He DB, Chen YT, Chen JH (2012) Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149–1157
Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Chaos, Solitons Fractals 39(3):1283–1289
Bergamo P, D’Arco P, Santis AD, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. In: IEEE Transactions on Circuits and systems—I: Regular papers, Vol 52, No 7, pp1382–1393
Zhang LH (2006) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solit Fractals 37(3):669–674
Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc A: Math Phys Eng Sci 426:233–271. https://doi.org/10.1098/rspa.1989.0125
Funding
National Science and Technology Council,NSTC 110-2221-E-320-005-MY2,NSTC 110-2221-E-320-005-MY2,NSTC 110-2221-E-320-005-MY2,NSTC 110-2221-E-320-005-MY2,NSTC 110-2221-E-320-005-MY2,Buddhist Tzu Chi Medical Foundation,TCMMP 112-02-03,TCMMP 112-02-03,TCMMP 112-02-03,TCMMP 112-02-03,TCMMP 112-02-03
Author information
Authors and Affiliations
Contributions
Conceptualization, T.-F.L., I.-P.C., J.-G W., Y.-C. C., S.-T. T. and R.-U.Y.; methodology, T.-F.L., I.-P.C., J.-G W., Y.-C. C., S.-T. T. and R.-U.Y.; writing—original draft preparation, T.-F.L., I.-P.C. R.-U. C.; Writing—review and editing, T.-F.L., I.-P.C., J.-G W., Y.-C. C., S.-T. T.. All authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Ethics approval
Not applicable.
Consent to publish
Not applicable.
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection on Special Issue on 2 - Track on Security and Privacy
Guest Editors: Rongxing Lu
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Lee, TF., Chang, IP., Wang, JG. et al. Extended chaotic map-based key management for hierarchical access control in e-medicine systems. Peer-to-Peer Netw. Appl. 17, 858–870 (2024). https://doi.org/10.1007/s12083-023-01621-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-023-01621-7