{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:27:45Z","timestamp":1778603265492,"version":"3.51.4"},"reference-count":37,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"This research was funded by Tecnol\u00f3gico de Monterrey, Escuela de Ingenier\u00eda y Ciencias, Av. General 571 Ram\u00f3n Corona 2514, Zapopan, Jalisco 45201, M\u00e9xico","award":["MX00134544"],"award-info":[{"award-number":["MX00134544"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The ever-growing ecosystem of the Internet of Things (IoT) integrating with the ever-evolving wireless communication technology paves the way for adopting new applications in a smart society. The core concept of smart society emphasizes utilizing information and communication technology (ICT) infrastructure to improve every aspect of life. Among the variety of smart services, eHealth is at the forefront of these promises. eHealth is rapidly gaining popularity to overcome the insufficient healthcare services and provide patient-centric treatment for the rising aging population with chronic diseases. Keeping in view the sensitivity of medical data, this interfacing between healthcare and technology has raised many security concerns. Among the many contemporary solutions, attribute-based encryption (ABE) is the dominant technology because of its inherent support for one-to-many transfer and fine-grained access control mechanisms to confidential medical data. ABE uses costly bilinear pairing operations, which are too heavy for eHealth\u2019s tiny wireless body area network (WBAN) devices despite its proper functionality. We present an efficient and secure ABE architecture with outsourcing intense encryption and decryption operations in this work. For practical realization, our scheme uses elliptic curve scalar point multiplication as the underlying technology of ABE instead of costly pairing operations. In addition, it provides support for attribute\/users revocation and verifiability of outsourced medical data. Using the selective-set security model, the proposed scheme is secure under the elliptic curve decisional Diffie\u2013Hellman (ECDDH) assumption. The performance assessment and top-ranked value via the help of fuzzy logic\u2019s evaluation based on distance from average solution (EDAS) method show that the proposed scheme is efficient and suitable for access control in eHealth smart societies.<\/jats:p>","DOI":"10.3390\/s22010336","type":"journal-article","created":{"date-parts":[[2022,1,9]],"date-time":"2022-01-09T23:08:26Z","timestamp":1641769706000},"page":"336","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1977-6365","authenticated-orcid":false,"given":"Shahzad","family":"Khan","sequence":"first","affiliation":[{"name":"Department of Information Security, Military College of Signals (MCS), NUST, Islamabad 44000, Pakistan"},{"name":"Department of Computer Science, Shaheed Benazir Bhutto University Sheringal, Dir 18000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3616-2621","authenticated-orcid":false,"given":"Waseem","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Information Security, Military College of Signals (MCS), NUST, Islamabad 44000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0974-6154","authenticated-orcid":false,"given":"Abdul","family":"Waheed","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Northern University, Nowshera 24100, Pakistan"},{"name":"School of Electrical and Computer Engineering, Seoul National University, Seoul 08826, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4216-1246","authenticated-orcid":false,"given":"Gulzar","family":"Mehmood","sequence":"additional","affiliation":[{"name":"Department of Computer Science, IQRA National University, Swat Campus 19220, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5952-8502","authenticated-orcid":false,"given":"Shawal","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University, Islamabad 44000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6623-1758","authenticated-orcid":false,"given":"Mahdi","family":"Zareei","sequence":"additional","affiliation":[{"name":"Tecnologico de Monterrey, School of Engineering and Sciences, Zapopan 45201, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6053-3384","authenticated-orcid":false,"given":"Rajesh Roshan","family":"Biswal","sequence":"additional","affiliation":[{"name":"Tecnologico de Monterrey, School of Engineering and Sciences, Zapopan 45201, Mexico"}]}],"member":"1968","published-online":{"date-parts":[[2022,1,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ali, S.T., Sivaraman, V., and Ostry, D. (2012, January 16\u201318). Zero reconciliation secret key generation for body-worn health monitoring devices. Proceedings of the Fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, AZ, USA.","DOI":"10.1145\/2185448.2185455"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"46313","DOI":"10.1109\/ACCESS.2021.3068194","article-title":"ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map","volume":"9","author":"Khan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","article-title":"A lightweight attribute-based encryption scheme for the Internet of Things","volume":"49","author":"Yao","year":"2015","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/TMSCS.2016.2525997","article-title":"Secure and efficient data communication protocol for wireless body area networks","volume":"2","author":"Hu","year":"2016","journal-title":"IEEE Trans. Multi-Scale Comput. Syst."},{"key":"ref_5","unstructured":"Belguith, S., Jemai, A., and Attia, R. (2015, January 24\u201329). Enhancing data security in cloud computing using a lightweight cryptographic algorithm. Proceedings of the 11th International Conference on Autonomic and Autonomous Systems, Rome, Italy."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.patcog.2017.10.015","article-title":"Distance metric optimization driven convolutional neural network for age invariant face recognition","volume":"75","author":"Li","year":"2018","journal-title":"Pattern Recognit."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1206","DOI":"10.1109\/TIFS.2016.2520880","article-title":"Fingerprint liveness detection using convolutional neural networks","volume":"11","author":"Nogueira","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/JSYST.2015.2460747","article-title":"Health-CPS: Healthcare cyber-physical system assisted by cloud and big data","volume":"11","author":"Zhang","year":"2015","journal-title":"IEEE Syst. J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","article-title":"Edge computing: Vision and challenges","volume":"3","author":"Shi","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"3580","DOI":"10.1109\/JIOT.2018.2845898","article-title":"Distributed collaborative execution on the edges and its application to amber alerts","volume":"5","author":"Zhang","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1675","DOI":"10.1109\/JPROC.2019.2925910","article-title":"Edge video analytics for public safety: A review","volume":"107","author":"Zhang","year":"2019","journal-title":"Proc. IEEE"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1007\/s00779-017-1056-7","article-title":"Utilizing fully homomorphic encryption to implement secure medical computation in smart cities","volume":"21","author":"Sun","year":"2017","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2415","DOI":"10.1007\/s10586-017-0796-5","article-title":"Towards secure and flexible EHR sharing in mobile health cloud under static assumptions","volume":"20","author":"Cai","year":"2017","journal-title":"Clust. Comput."},{"key":"ref_14","unstructured":"Green, M., Hohenberger, S., and Waters, B. (2011, January 8\u201312). Outsourcing the decryption of abe ciphertexts. Proceedings of the USENIX Security Symposium, San Francisco, CA, USA. no.3."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Chen, L., and Hoang, D.B. (2011, January 2\u20134). Novel data protection model in healthcare cloud. Proceedings of the 2011 IEEE International Conference on High Performance Computing and Communication, Banff, AB, Canada.","DOI":"10.1109\/HPCC.2011.148"},{"key":"ref_16","unstructured":"Waters, B. (2005, January 22\u201326). Efficient identity-based encryption without random oracles. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark."},{"key":"ref_17","unstructured":"Goyal, V., Pandey, O., Sahai, A., and Waters, B. (30\u20133, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on COMPUTER and Communications Security, Alexandria, VA, USA."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP\u201907), Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Li, J., Jia, C., Li, J., and Chen, X. (2012, January 17\u201319). Outsourcing encryption of attribute-based encryption with mapreduce. Proceedings of the International Conference on Information and Communications Security, Chongqing, China.","DOI":"10.1007\/978-3-642-34129-8_17"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","article-title":"Securely outsourcing attribute-based encryption with checkability","volume":"25","author":"Li","year":"2013","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_21","unstructured":"Asim, M., Petkovic, M., and Ignatenko, T. (2014, January 1\u20133). Attribute-based encryption with encryption and decryption outsourcing. Proceedings of the 12th Australian Information Security Management Conference, Perth, Australia."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1016\/j.future.2020.09.021","article-title":"An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare","volume":"115","author":"Zhong","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"29023","DOI":"10.1109\/ACCESS.2018.2890565","article-title":"An efficient ABE scheme with verifiable outsourced encryption and decryption","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"114392","DOI":"10.1109\/ACCESS.2021.3104899","article-title":"OO-ABMS: Online\/Offline-Aided Attribute-Based Multi-Keyword Search","volume":"9","author":"Khan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"193426","DOI":"10.1155\/2014\/193426","article-title":"A survey of research progress and development tendency of attribute-based encryption","volume":"2014","author":"Pang","year":"2014","journal-title":"Sci. World J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/JIOT.2015.2417684","article-title":"An IoT-aware architecture for smart healthcare systems","volume":"2","author":"Catarinucci","year":"2015","journal-title":"IEEE Internet Things J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"6384","DOI":"10.1109\/JIOT.2019.2900631","article-title":"Enhancement of a lightweight attribute-based encryption scheme for the internet of things","volume":"6","author":"Tan","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Tan, Y.L., Goi, B.M., Komiya, R., and Tan, S.Y. (2011, January 14\u201316). A study of attribute-based encryption for body sensor networks. Proceedings of the International Conference on Informatics Engineering and Information, Kuala Lumpur, Malaysia.","DOI":"10.1007\/978-3-642-25327-0_21"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"259798","DOI":"10.1155\/2014\/259798","article-title":"An attribute-based encryption scheme with revocation for fine-grained access control in wireless body area networks","volume":"10","author":"Tian","year":"2014","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Coyne","year":"1996","journal-title":"IEEE Comput."},{"key":"ref_31","first-page":"102559","article-title":"A ciphertext-policy Attribute based encryption scheme for wireless body area networks based on ECC","volume":"54","author":"Sowjanya","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"87219","DOI":"10.1109\/ACCESS.2021.3084905","article-title":"A Novel Defocused Image Segmentation Method based on PCNN and LBP","volume":"9","author":"Basar","year":"2021","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"131397","DOI":"10.1109\/ACCESS.2020.3007405","article-title":"A trust-based energy-efficient and reliable communication scheme (trust-based ERCS) for remote patient monitoring in wireless body area networks","volume":"8","author":"Mehmood","year":"2020","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Basar, S., Ali, M., Ochoa-Ruiz, G., Zareei, M., Waheed, A., and Adnan, A. (2020). Unsupervised color image segmentation: A case of RGB histogram based K-means clustering initialization. PLoS ONE, 15.","DOI":"10.1371\/journal.pone.0240015"},{"key":"ref_35","unstructured":"Sahai, A., and Waters, B. (2005, January 22\u201326). Fuzzy identity-based encryption. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1007\/s11280-019-00671-3","article-title":"Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control","volume":"23","author":"Cao","year":"2020","journal-title":"World Wide Web"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"3201","DOI":"10.1007\/s13369-016-2156-9","article-title":"Provably secure threshold-based abe scheme without bilinear map","volume":"41","author":"Karati","year":"2016","journal-title":"Arab. J. Sci. Eng."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/1\/336\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:35:59Z","timestamp":1760362559000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/1\/336"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,3]]},"references-count":37,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,1]]}},"alternative-id":["s22010336"],"URL":"https:\/\/doi.org\/10.3390\/s22010336","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,3]]}}}