Secure Healthcare Access Control System (SHACS) for Anomaly Detection and Enhanced Security in Cloud-Based Healthcare Applications

被引:0
|
作者
Sangeetha, S. K. B. [1 ]
Selvarathi, C. [2 ]
Mathivanan, Sandeep Kumar [3 ]
Cho, Jaehyuk [4 ]
Easwaramoorthy, Sathishkumar Veerappampalayam [5 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Vadapalani Campus, Chennai 600026, Tamil Nadu, India
[2] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci & T, Dept Comp Sci & Engn, Chennai 600062, Tamil Nadu, India
[3] Galgotias Univ, Dept Comp Sci & Engn, Greater Noida 203201, India
[4] Jeonbuk Natl Univ, Dept Software Engn, Div Elect & Informat Engn, Jeonju 54896, South Korea
[5] Sunway Univ, Sch Engn & Technol, Petaling Jaya 47500, Selangor, Malaysia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Medical services; Access control; Security; Cloud computing; Real-time systems; Organizations; Authentication; Protocols; Process control; Machine learning; Healthcare access control; attribute-based access control (ABAC); cloud security; electronic health records (EHR); authentication efficiency; INTRUSION DETECTION SYSTEM;
D O I
10.1109/ACCESS.2024.3492024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing reliance on distributed cloud technology in mobile healthcare applications has introduced critical challenges in ensuring secure and efficient access to Electronic Health Records (EHR). Traditional methods have prolonged authentication times and access delays, compromising both the efficiency and security of healthcare systems. To address these issues, this study proposes the Secure Healthcare Access Control System (SHACS), a robust framework specifically designed to enhance security and efficiency in healthcare environments. SHACS provides a sophisticated combination of role-based access control, attribute-based policies, and dynamic rules to streamline authentication processes and safeguard data access. SHACS architecture provides the central authority and system authorities, responsible for enforcing access control policies and verifying the authenticity of users requesting access to medical records. SHACS also integrates real-time anomaly detection capabilities, utilizing the MIMIC-III dataset to identify and respond to unusual access patterns, thereby mitigating potential security breaches. Following successful authentication, SHACS generates secure decryption tokens and keys, enabling swift and secure access to EHRs while continuously updating a dynamic access list to monitor and reduce access delays. Experimental results demonstrate that SHACS significantly improves system performance, reducing authentication times by 30% and access delays by 25% compared to traditional methods. For instance, SHACS decreased the average authentication time from 40 seconds to 28 seconds and enhanced system responsiveness, lowering average access delays from 15 seconds to 11 seconds. The implementation of SHACS underscores the importance of privacy-enhancing technologies in safeguarding medical records, ensuring that only authorized personnel access sensitive data. Through rigorous testing and analysis, SHACS proves its efficacy in strengthening the security posture of cloud-based healthcare systems, ultimately contributing to the quality and accessibility of remote healthcare services.
引用
收藏
页码:164543 / 164559
页数:17
相关论文
共 50 条
  • [21] Security Solutions in Cloud-based Healthcare Information Systems: A Systematic Review
    Tabatabaei, Mohsen S.
    Langarizadeh, Mostafa
    Akbari, Mohammad K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (09): : 57 - 64
  • [22] A new agent-based framework combining authentication, access control and user behavior analysis for secure and flexible cloud-based healthcare environment
    Ennahbaoui, Mohammed
    Idrissi, Hind
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05):
  • [23] Secured and Privacy-Preserving Multi-Authority Access Control System for Cloud-Based Healthcare Data Sharing
    Gupta, Reetu
    Kanungo, Priyesh
    Dagdee, Nirmal
    Madhu, Golla
    Sahoo, Kshira Sagar
    Jhanjhi, N. Z.
    Masud, Mehedi
    Almalki, Nabil Sharaf
    AlZain, Mohammed A.
    SENSORS, 2023, 23 (05)
  • [24] A Secure Blockchain-Based Access Control Architecture for IoT-Healthcare Applications
    Raj, Anu
    Prakash, Shiva
    NATIONAL ACADEMY SCIENCE LETTERS-INDIA, 2024, 47 (05): : 529 - 537
  • [25] An empirical IoT and cloud-based customizable healthcare surveillance system
    Meti S.
    Razauddin S.
    Nallakumar R.
    Mansingh P.M.B.
    Sameen A.Z.
    Pandey S.
    Bhatt S.K.
    Jayabalan B.
    International Journal of Information Technology, 2024, 16 (8) : 5317 - 5323
  • [26] Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications
    Roy, Sandip
    Das, Ashok Kumar
    Chatterjee, Santanu
    Kumar, Neeraj
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (01) : 457 - 468
  • [27] ITrust: identity and trust based access control model for healthcare system security
    Ashish Singh
    Kakali Chatterjee
    Multimedia Tools and Applications, 2019, 78 : 28309 - 28330
  • [28] ITrust: identity and trust based access control model for healthcare system security
    Singh, Ashish
    Chatterjee, Kakali
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (19) : 28309 - 28330
  • [29] A Role and Activity Based Access Control for Secure Healthcare Systems
    Pulur, Naim Alperen
    Altop, Duygu Karaoglan
    Levi, Albert
    INFORMATION SCIENCES AND SYSTEMS 2015, 2016, 363 : 93 - 103
  • [30] Improving intrusion detection in cloud-based healthcare using neural network
    Patel, Sagarkumar K.
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2023, 83