Secure Healthcare Access Control System (SHACS) for Anomaly Detection and Enhanced Security in Cloud-Based Healthcare Applications

被引:0
|
作者
Sangeetha, S. K. B. [1 ]
Selvarathi, C. [2 ]
Mathivanan, Sandeep Kumar [3 ]
Cho, Jaehyuk [4 ]
Easwaramoorthy, Sathishkumar Veerappampalayam [5 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Vadapalani Campus, Chennai 600026, Tamil Nadu, India
[2] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci & T, Dept Comp Sci & Engn, Chennai 600062, Tamil Nadu, India
[3] Galgotias Univ, Dept Comp Sci & Engn, Greater Noida 203201, India
[4] Jeonbuk Natl Univ, Dept Software Engn, Div Elect & Informat Engn, Jeonju 54896, South Korea
[5] Sunway Univ, Sch Engn & Technol, Petaling Jaya 47500, Selangor, Malaysia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Medical services; Access control; Security; Cloud computing; Real-time systems; Organizations; Authentication; Protocols; Process control; Machine learning; Healthcare access control; attribute-based access control (ABAC); cloud security; electronic health records (EHR); authentication efficiency; INTRUSION DETECTION SYSTEM;
D O I
10.1109/ACCESS.2024.3492024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing reliance on distributed cloud technology in mobile healthcare applications has introduced critical challenges in ensuring secure and efficient access to Electronic Health Records (EHR). Traditional methods have prolonged authentication times and access delays, compromising both the efficiency and security of healthcare systems. To address these issues, this study proposes the Secure Healthcare Access Control System (SHACS), a robust framework specifically designed to enhance security and efficiency in healthcare environments. SHACS provides a sophisticated combination of role-based access control, attribute-based policies, and dynamic rules to streamline authentication processes and safeguard data access. SHACS architecture provides the central authority and system authorities, responsible for enforcing access control policies and verifying the authenticity of users requesting access to medical records. SHACS also integrates real-time anomaly detection capabilities, utilizing the MIMIC-III dataset to identify and respond to unusual access patterns, thereby mitigating potential security breaches. Following successful authentication, SHACS generates secure decryption tokens and keys, enabling swift and secure access to EHRs while continuously updating a dynamic access list to monitor and reduce access delays. Experimental results demonstrate that SHACS significantly improves system performance, reducing authentication times by 30% and access delays by 25% compared to traditional methods. For instance, SHACS decreased the average authentication time from 40 seconds to 28 seconds and enhanced system responsiveness, lowering average access delays from 15 seconds to 11 seconds. The implementation of SHACS underscores the importance of privacy-enhancing technologies in safeguarding medical records, ensuring that only authorized personnel access sensitive data. Through rigorous testing and analysis, SHACS proves its efficacy in strengthening the security posture of cloud-based healthcare systems, ultimately contributing to the quality and accessibility of remote healthcare services.
引用
收藏
页码:164543 / 164559
页数:17
相关论文
共 50 条
  • [31] Compatibility of a Security Policy for a Cloud-Based Healthcare System with the EU General Data Protection Regulation (GDPR)
    Georgiou, Dimitra
    Lambrinoudakis, Costas
    INFORMATION, 2020, 11 (12) : 1 - 19
  • [32] Integration of Healthcare 4.0 and blockchain into secure cloud-based electronic health records systems
    Mahajan, Hemant B.
    Rashid, Ameer Sardar
    Junnarkar, Aparna A.
    Uke, Nilesh
    Deshpande, Sarita D.
    Futane, Pravin R.
    Alkhayyat, Ahmed
    Alhayani, Bilal
    APPLIED NANOSCIENCE, 2022, 13 (3) : 2329 - 2342
  • [33] Secure IoT Healthcare Architecture with Deep Learning-Based Access Control System
    Thilagam, K.
    Beno, A.
    Lakshmi, M. Vanitha
    Wilfred, C. Bazil
    George, Santhi M.
    Karthikeyan, M.
    Peroumal, Vijayakumar
    Ramesh, C.
    Karunakaran, Prabakaran
    JOURNAL OF NANOMATERIALS, 2022, 2022
  • [34] Secure cloud-based e-learning system with access control and group key mechanism
    Kanimozhi, S.
    Kannan, A.
    Devi, K. Suganya
    Selvamani, K.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (12):
  • [35] Cloud-Based Blockchains for Secure and Reliable Big Data Storage Service in Healthcare Systems
    Thamrin, Alvin
    Xu, Haiping
    2021 15TH IEEE INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2021), 2021, : 91 - 99
  • [36] A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
    Wu, Tsu-Yang
    Yang, Lei
    Luo, Jia-Ning
    Wu, Jimmy Ming-Tai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [37] Design of secure access control scheme for personal health record-based cloud healthcare service
    Liu, Chia-Hui
    Lin, Fong-Qi
    Chen, Chin-Sheng
    Chen, Tzer-Shyong
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1332 - 1346
  • [38] Cloud-Based Hospital Information System as a Service for Grassroots Healthcare Institutions
    Qin Yao
    Xiong Han
    Xi-Kun Ma
    Yi-Feng Xue
    Yi-Jun Chen
    Jing-Song Li
    Journal of Medical Systems, 2014, 38
  • [39] Secure data authentication and access control protocol for industrial healthcare system
    Gupta D.S.
    Mazumdar N.
    Nag A.
    Singh J.P.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (05) : 4853 - 4864
  • [40] Cloud-Based Hospital Information System as a Service for Grassroots Healthcare Institutions
    Yao, Qin
    Han, Xiong
    Ma, Xi-Kun
    Xue, Yi-Feng
    Chen, Yi-Jun
    Li, Jing-Song
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (09)