Secure Healthcare Access Control System (SHACS) for Anomaly Detection and Enhanced Security in Cloud-Based Healthcare Applications

被引:0
|
作者
Sangeetha, S. K. B. [1 ]
Selvarathi, C. [2 ]
Mathivanan, Sandeep Kumar [3 ]
Cho, Jaehyuk [4 ]
Easwaramoorthy, Sathishkumar Veerappampalayam [5 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Vadapalani Campus, Chennai 600026, Tamil Nadu, India
[2] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci & T, Dept Comp Sci & Engn, Chennai 600062, Tamil Nadu, India
[3] Galgotias Univ, Dept Comp Sci & Engn, Greater Noida 203201, India
[4] Jeonbuk Natl Univ, Dept Software Engn, Div Elect & Informat Engn, Jeonju 54896, South Korea
[5] Sunway Univ, Sch Engn & Technol, Petaling Jaya 47500, Selangor, Malaysia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Medical services; Access control; Security; Cloud computing; Real-time systems; Organizations; Authentication; Protocols; Process control; Machine learning; Healthcare access control; attribute-based access control (ABAC); cloud security; electronic health records (EHR); authentication efficiency; INTRUSION DETECTION SYSTEM;
D O I
10.1109/ACCESS.2024.3492024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing reliance on distributed cloud technology in mobile healthcare applications has introduced critical challenges in ensuring secure and efficient access to Electronic Health Records (EHR). Traditional methods have prolonged authentication times and access delays, compromising both the efficiency and security of healthcare systems. To address these issues, this study proposes the Secure Healthcare Access Control System (SHACS), a robust framework specifically designed to enhance security and efficiency in healthcare environments. SHACS provides a sophisticated combination of role-based access control, attribute-based policies, and dynamic rules to streamline authentication processes and safeguard data access. SHACS architecture provides the central authority and system authorities, responsible for enforcing access control policies and verifying the authenticity of users requesting access to medical records. SHACS also integrates real-time anomaly detection capabilities, utilizing the MIMIC-III dataset to identify and respond to unusual access patterns, thereby mitigating potential security breaches. Following successful authentication, SHACS generates secure decryption tokens and keys, enabling swift and secure access to EHRs while continuously updating a dynamic access list to monitor and reduce access delays. Experimental results demonstrate that SHACS significantly improves system performance, reducing authentication times by 30% and access delays by 25% compared to traditional methods. For instance, SHACS decreased the average authentication time from 40 seconds to 28 seconds and enhanced system responsiveness, lowering average access delays from 15 seconds to 11 seconds. The implementation of SHACS underscores the importance of privacy-enhancing technologies in safeguarding medical records, ensuring that only authorized personnel access sensitive data. Through rigorous testing and analysis, SHACS proves its efficacy in strengthening the security posture of cloud-based healthcare systems, ultimately contributing to the quality and accessibility of remote healthcare services.
引用
收藏
页码:164543 / 164559
页数:17
相关论文
共 50 条
  • [1] Cloud-based Secure Smartcard Healthcare Monitoring and Tracking System
    Moudgil, Kartik
    Maheshwari, Ria
    Parekh, Harshal Bharatkumar
    Devadkar, Kailas
    PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [2] An Enhanced Lightweight Speck System for Cloud-Based Smart Healthcare
    AbdulRaheem, Muyideen
    Balogun, Ghaniyyat Bolanle
    Abiodun, Moses Kazeem
    Taofeek-Ibrahim, Fatimoh Abidemi
    Tomori, Adekola Rasheed
    Oladipo, Idowu Dauda
    Awotunde, Joseph Bamidele
    APPLIED INFORMATICS (ICAI 2021), 2021, 1455 : 363 - 376
  • [3] A Cloud-based Mobile Healthcare System
    Lin, Chin-Fu
    Lin, Shih-Hsuan
    Peng, Sheng-Lung
    Chang, Ruay-Shiung
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 2001 - 2010
  • [4] Neutrosophic Model for Evaluation Healthcare Security Criteria for Powerful and Lightweight Secure Storage System in Cloud-Based E-Healthcare Services
    El-Douh A.A.
    Lu S.
    Abdelhafeez A.
    Ali A.M.
    Aziz A.S.
    Neutrosophic Sets and Systems, 2023, 58 : 367 - 378
  • [5] Secure access control for cloud-based tele medical system
    Gupta, Sunil
    Bansiya, Akansha
    Saini, Mansi
    Sidhu, Amuleek
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2022, 18 (03) : 232 - 239
  • [6] IMPLEMENTING A SECURE CLOUD-BASED SYSTEM TO SAFEGUARD SENSITIVE MEDICAL DATA FOR HEALTHCARE
    Zghair, Noor abdul khaleq
    Al-sadi, Ameer mosa
    Taresh, Ali abdul razzaq
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (06): : 5240 - 5249
  • [7] Secure and intelligent architecture for cloud-based healthcare applications in wireless body sensor networks
    Rani, A. Antony Viswasa
    Baburaj, E.
    INTERNATIONAL JOURNAL OF BIOMEDICAL ENGINEERING AND TECHNOLOGY, 2019, 29 (02) : 186 - 199
  • [8] A Framework for Secure Logging in Precision Healthcare Cloud-based Services
    Moghaddam, Parisa
    Iqbal, Shahrear
    Traore, Issa
    2021 IEEE INTERNATIONAL CONFERENCE ON DIGITAL HEALTH (ICDH 2021), 2021, : 212 - 214
  • [9] Anomaly detection in IoT-based healthcare: machine learning for enhanced security
    Khan, Maryam Mahsal
    Alkhathami, Mohammed
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [10] Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
    Esposito, Christian
    De Santis, Alfredo
    Tortora, Genny
    Chang, Henry
    Choo, Kim-Kwang Raymond
    IEEE CLOUD COMPUTING, 2018, 5 (01): : 31 - 37