Efficient access requests management for healthcare data with security and privacy-preserving

被引:0
|
作者
Kumar, Sandeep [1 ]
Shaw, Dilip Kumar [1 ]
机构
[1] Natl Inst Technol, Dept CSE, Jamshedpur 831014, Jharkhand, India
关键词
Recurrent and Convolution Layered Neural; Network (RCLNN); Standardized Padding Scheme (SPS) based hashing; Twisted Hessian Curve based data security; Blockchain; Access Control Cyber Policy;
D O I
10.1016/j.eswa.2024.126194
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data security and privacy-preserving are vital parts in the healthcare context for protecting confidential patient information, medical data, and history with local hospitals. Owing to single data type-based security, lack of policy-hiding strategies, and insider threats, conventional data security technology failed to guarantee data security. Thus, this work proposes a secure healthcare framework for ensuring the security of patient's healthcare data, realizing Access Control (AC) with the help of the data owner, and supporting normal and emergency scenarios. Primarily, to maintain secure data sharing, the patients are provided with a sub-secret during patient and doctor registration. After that, by utilizing the Recurrent and Convolution Layered Neural Network (RCLNN), the healthcare data is collected and categorized into two data types; then, the categorized data are encrypted using the Twisted Hessian Curve Cryptography (THCC) algorithm and Inversion Method (IM)-based embedding technique. Moreover, to provide authorization, an access policy is enforced. Hence, by utilizing the Standardized Padding Scheme-based Secure Hashing Algorithm-256 (SPS-SHA-256) algorithm, the AC policy is securely stored in the Blockchain (BC). Conversely, the user requests are classified using a Fuzzy Logic System (FLS) to provide controlled data access according to the risk evaluation and allow patients to define data access. Lastly, the outcomes displayed that for healthcare data security as well as privacy-preserving, the proposed AC model is highly secure and efficient.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Blockchain-Enabled and Data-Driven Smart Healthcare Solution for Secure and Privacy-Preserving Data Access
    Younis, Mohamed
    Lalouani, Wassila
    Lasla, Noureddine
    Emokpae, Lloyd
    Abdallah, Mohamed
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 3746 - 3757
  • [42] Privacy-Preserving Process Mining in Healthcare
    Pika, Anastasiia
    Wynn, Moe T.
    Budiono, Stephanus
    ter Hofstede, Arthur H. M.
    van der Aalst, Wil M. P.
    Reijers, Hajo A.
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2020, 17 (05)
  • [43] Load Balancing for Privacy-Preserving Access to Big Data in Cloud
    Li, Peng
    Guo, Song
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 524 - 528
  • [44] Privacy-preserving healthcare informatics: a review
    Chong, Kah Meng
    16TH IMT-GT INTERNATIONAL CONFERENCE ON MATHEMATICS, STATISTICS AND THEIR APPLICATIONS (ICMSA 2020), 2021, 36
  • [45] Privacy-Preserving Access Control Model for Big Data Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 130 - 135
  • [46] Enhancing Security and Scalability in Electronic Voting through Privacy-Preserving Cryptography and Efficient Data Structures
    Misiakoulis, George
    Niavis, Harris
    Kundig, Stephane
    Loupos, Konstantinos
    2024 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN 2024, 2024, : 631 - 636
  • [47] An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems
    Gopalan, Shynu Padinjappurathu
    Chowdhary, Chiranji Lal
    Iwendi, Celestine
    Farid, Muhammad Awais
    Ramasamy, Lakshmana Kumar
    SENSORS, 2022, 22 (15)
  • [48] A robust multi-key authority system for privacy-preserving distribution and access control of healthcare data
    Rajput, Amitesh Singh
    Agarwal, Arnav
    Raja, Kiran B.
    COMPUTER COMMUNICATIONS, 2024, 225 : 195 - 204
  • [49] An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy
    Yang, Kan
    Han, Qi
    Li, Hui
    Kan, Zheng
    Zhou, Su
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 563 - 571
  • [50] An efficient privacy-preserving authentication scheme with enhanced security for IoMT applications
    Xu, Feihong
    Liu, Shubo
    Yang, Xu
    COMPUTER COMMUNICATIONS, 2023, 208 : 171 - 178