The University of Southampton
University of Southampton Institutional Repository

Multi-user oriented data sharing scheme for internet of medical things based on dual cryptography mechanism

Multi-user oriented data sharing scheme for internet of medical things based on dual cryptography mechanism
Multi-user oriented data sharing scheme for internet of medical things based on dual cryptography mechanism
Encrypted sharing of Internet of Medical Things (IoMT) data is essential for facilitating collaboration, safeguarding patient privacy, and advancing clinical research. However, existing encryption schemes face numerous challenges in multi-user environments. Traditional proxy re-encryption requires exclusive ciphertext for each user, which is evidently unsuitable for IoMT’s multi-user scenarios. Meanwhile, attribute-based encryption provides flexible data access control, but its complex computations and high resource demands limit its use in large-scale IoMT environments. Additionally, challenges like single-point failure and redundant backups emerge in ciphertext storage. To address these challenges, we propose a dual-cryptography mechanism integrating enhanced proxy re-encryption and attribute-based encryption. Our scheme enables unified ciphertext access for authorized users while applying attribute encryption exclusively to small data keys. To mitigate potential data loss from storage server failures, we propose a decentralized ciphertext storage and recovery mechanism with verifiable secret sharing. Furthermore, we implement decentralized ciphertext storage using verifiable secret sharing, ensuring recoverability from server failures. Formal analysis proves confidentiality under the random oracle model. Experimental results demonstrate high security strength, computational efficiency, and robustness. The solution prevents single-point failures, resists collusion attacks, and maintains traceability through blockchain-integrated audit trails.
Zheng, Guiping
5fc1890b-a315-49e0-8cc2-ca8ecd6ebdde
Gong, Bei
dd699a78-c0f9-498d-87d4-03f66274f316
Waqas, Muhammad
28f978b5-2da0-4060-aa7c-d5cadc1a48e1
Ahmad, Iftekhar
a8851363-88f5-4d1d-ad7a-ec9a6e3619a2
Alasmary, Hisham
5f38ead1-f928-4f7d-bc0d-81a3ccb53034
Chen, Sheng
9310a111-f79a-48b8-98c7-383ca93cbb80
Zheng, Guiping
5fc1890b-a315-49e0-8cc2-ca8ecd6ebdde
Gong, Bei
dd699a78-c0f9-498d-87d4-03f66274f316
Waqas, Muhammad
28f978b5-2da0-4060-aa7c-d5cadc1a48e1
Ahmad, Iftekhar
a8851363-88f5-4d1d-ad7a-ec9a6e3619a2
Alasmary, Hisham
5f38ead1-f928-4f7d-bc0d-81a3ccb53034
Chen, Sheng
9310a111-f79a-48b8-98c7-383ca93cbb80

Zheng, Guiping, Gong, Bei, Waqas, Muhammad, Ahmad, Iftekhar, Alasmary, Hisham and Chen, Sheng (2025) Multi-user oriented data sharing scheme for internet of medical things based on dual cryptography mechanism. IEEE Transactions on Sustainable Computing. (doi:10.1109/TSUSC.2025.3619389).

Record type: Article

Abstract

Encrypted sharing of Internet of Medical Things (IoMT) data is essential for facilitating collaboration, safeguarding patient privacy, and advancing clinical research. However, existing encryption schemes face numerous challenges in multi-user environments. Traditional proxy re-encryption requires exclusive ciphertext for each user, which is evidently unsuitable for IoMT’s multi-user scenarios. Meanwhile, attribute-based encryption provides flexible data access control, but its complex computations and high resource demands limit its use in large-scale IoMT environments. Additionally, challenges like single-point failure and redundant backups emerge in ciphertext storage. To address these challenges, we propose a dual-cryptography mechanism integrating enhanced proxy re-encryption and attribute-based encryption. Our scheme enables unified ciphertext access for authorized users while applying attribute encryption exclusively to small data keys. To mitigate potential data loss from storage server failures, we propose a decentralized ciphertext storage and recovery mechanism with verifiable secret sharing. Furthermore, we implement decentralized ciphertext storage using verifiable secret sharing, ensuring recoverability from server failures. Formal analysis proves confidentiality under the random oracle model. Experimental results demonstrate high security strength, computational efficiency, and robustness. The solution prevents single-point failures, resists collusion attacks, and maintains traceability through blockchain-integrated audit trails.

Text
TSUSC2025 - Accepted Manuscript
Available under License Creative Commons Attribution.
Download (971kB)

More information

Accepted/In Press date: 5 October 2025
e-pub ahead of print date: 8 October 2025

Identifiers

Local EPrints ID: 506666
URI: http://eprints.soton.ac.uk/id/eprint/506666
PURE UUID: 83f5712b-9203-48d6-a1c2-2abbea6d4efd

Catalogue record

Date deposited: 13 Nov 2025 17:47
Last modified: 13 Nov 2025 17:47

Export record

Altmetrics

Contributors

Author: Guiping Zheng
Author: Bei Gong
Author: Muhammad Waqas
Author: Iftekhar Ahmad
Author: Hisham Alasmary
Author: Sheng Chen

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×