Repository logo

Location-Aware Authorization Scheme for Emergency Response

dc.contributor.authorGhafghazi, Hamidreza
dc.contributor.authorElmougy, Amr
dc.contributor.authorMouftah, Hussein T.
dc.contributor.authorAdams, Carlisle
dc.date.accessioned2019-06-04T14:00:50Z
dc.date.available2019-06-04T14:00:50Z
dc.date.issued2016
dc.description.abstractEffective emergency (such as a hurricane, a building on fire, and so on) response requires accurate, relevant, timely, and location-aware information (e.g., environmental information, health records, and so on). Acquiring information in such critical situations encounters substantial challenges, such as large volume of data processing, unstructured data, privacy, authorized data access, and so forth. Among the issues, access authorization has received little attention. Existing solutions for data authorization either do not scale well or merely consider a Break-the-Glass concept in which a master key is provided to the first responders (FRs) to decrypt the corresponding ciphertext. This may not only enable unauthorized users to access information, but it may also overwhelm FRs by the large volume of accessible data. To jointly address the aforementioned issues, this paper proposes a location-aware authorization scheme that enables FRs to access information provided that they are within a predefined distance from data owners at the time of an emergency. We innovatively integrate attribute-based encryption with broadcast encryption to incorporate dynamic attributes (i.e., location and time) into an access policy. Such attributes act as filters to eliminate data irrelevant to an ongoing emergency. As a result, our scheme provides authorized access to accurate, relevant, timely, and location-aware information. We provide extensive security analysis and performance evaluations to demonstrate the effectiveness of our scheme. The analysis shows that the scheme imposes constant communication and decryption computation overheads. Furthermore, the proposed scheme is proven chosen plain-text attack selectively secure based on m-bilinear Diffie-Hellman exponent assumption. It also addresses the key escrow problem.en_US
dc.identifier.doi10.1109/ACCESS.2016.2601442en_US
dc.identifier.issn2169-3536en_US
dc.identifier.urihttps://doi.org/10.20381/ruor-23523
dc.identifier.urihttp://hdl.handle.net/10393/39276
dc.language.isoenen_US
dc.titleLocation-Aware Authorization Scheme for Emergency Responseen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail ImageThumbnail Image
Name:
07547379.pdf
Size:
10.32 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail ImageThumbnail Image
Name:
license.txt
Size:
4.92 KB
Format:
Item-specific license agreed upon to submission
Description: