29th International Conference on Information Technology (IT)
ˇ
Zabljak, 19 – 22 February, 2025
Enhancing Traceability and Security in mHealth
Systems: A Proximal Policy Optimization-Based
Multi-Authority Attribute-Based Encryption
Approach
Bhargavi Konda, Akhila Reddy Yadulla, Vinay Kumar Kasula, Mounica Yenugula and Chakradhar Adupa
Abstract— Mobile healthcare (mHealth) is an emerging tech-
nology that facilitates the sharing of personal health records
(PHR), but it also introduces risks related to the security
and privacy of PHRs. To address these concerns, Attribute-
Based Encryption (ABE) has been proposed as an advanced
cryptographic solution to enable fine-grained access control
over encrypted data. However, existing attribute-based mHealth
systems often lack efficient traceability or are limited to
a single authority. This paper presents a novel traceable
multi-authority ABE scheme, incorporating Proximal Policy
Optimization (PPO), a state-of-the-art reinforcement learning
algorithm, to enhance traceability and security. The scheme
is built on composite order groups and supports arbitrary
monotonic access structures defined by Linear Secret Sharing
Schemes (LSSS). The security of the system is validated under
adaptive security assumptions, with PPO optimizing the access
control decisions and identifying potential vulnerabilities in
real-time. Additionally, the performance of the system is evalu-
ated, demonstrating its efficiency, scalability, and availability for
practical mHealth applications. This approach not only ensures
robust access control but also guarantees high adaptability
and traceability, effectively addressing privacy concerns in the
sharing of sensitive health data.
I. I NTRODUCTION
Mobile healthcare (mHealth) systems leverage mobile
devices and emerging technologies such as cloud computing,
wireless sensors, and communication technologies to collect,
record, and integrate personal health records (PHRs). These
records are then uploaded to cloud-based health information
management platforms, enabling various health services from
providers. While mHealth offers a convenient way to share
PHRs and provide personalized healthcare services, it also
introduces significant privacy and security challenges due to
*This work was not supported by any organization
Bhargavi Konda is a Systems Analyst IV, HRIS, Auburndale, MA 02466
USA (e-mail: bhargavi kondaatriushealth.org)
Vinay Kumar Kasula is a Sr. Systems Applications Analyst, VISA Inc,
Ashburn, VA 20147, USA (e-mail: vikasula@visa.com)
Akhila Reddy Yadulla, Mounica Yenugula is with the Depart-
ment of Information Technology, University of the Cumberlands,
Williamsburg, KY 40769, USA (e-mail: akhilareddyyadulla@ieee.org;
ymounica.phd@ieee.org)
Chakradhar Adupa is Assistant Professor of Department of Electronics
and Communication Engineering, SR University, Hanamkonda, TG 506371,
India (e-mail: chakradhar.a@sru.edu.in)
the sensitive nature of PHRs, such as medical histories and
diagnostic records [1] [2].
Attribute-Based Encryption (ABE) has emerged as a pow-
erful cryptographic technique to address these challenges by
enabling fine-grained access control through the association
of data encryption with user attributes. ABE supports a
one-to-many encryption model, ensuring data confidentiality
and controlled access. ABE schemes are generally classified
into two types: Ciphertext-Policy ABE (CP-ABE), where the
data owner defines the access policy, and Key-Policy ABE
(KP-ABE), where the access policy is embedded within the
users private key [3]. CP-ABE is particularly well-suited for
mHealth systems, as it allows data owners to specify access
policies that align with real-world scenarios and their needs
for fine-grained control [4].
However, existing mHealth systems face two major chal-
lenges in implementing ABE effectively:
• Single Authority Bottleneck: In single-authority ABE
schemes, a central authority manages the entire attribute
domain and generates all user keys, which creates a
bottleneck in terms of both system performance and
security. Multi-authority ABE schemes were introduced
to address this issue by distributing the management of
attributes across multiple authorities [5]. Despite this,
early multi-authority schemes lacked essential features
such as adaptive security or traceability, limiting their
applicability in real-world scenarios.
• Malicious User Traceability: In ABE systems, ma-
licious users may sell their decryption keys to unau-
thorized users for illegal benefits. Given that attributes
in ABE can be shared among multiple users, tracing
the source of compromised keys becomes a challeng-
ing task. Existing traceable ABE schemes often focus
on single-authority setups or rely on simplistic access
policies, which restrict their scalability and robustness
[6] [7].
This paper aims to address these challenges by integrating
Proximal Policy Optimization (PPO), a cutting-edge rein-
forcement learning algorithm, into a novel multi-authority
CP-ABE scheme. The proposed scheme enhances traceabil-
ity by enabling the identification of malicious users and
ensures adaptive security in multi-authority settings. The 979-8-3315-1764-9/25/$31.00 ©2025 IEEE