An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment

被引:4
|
作者
Butt, Ateeq Ur Rehman [1 ]
Mahmood, Tariq [1 ,2 ]
Saba, Tanzila [1 ]
Bahaj, Saeed Ali Omer [3 ]
Alamri, Faten S. [4 ]
Iqbal, Muhammad Waseem [5 ]
Khan, Amjad R. [2 ]
机构
[1] Prince Sultan Univ, Artificial Intelligence & Data Analyt AIDA Lab, CCIS, Riyadh 11586, Saudi Arabia
[2] Univ Educ Vehari Campus, Fac Informat Sci, Vehari 61100, Pakistan
[3] Prince Sattam bin Abdulaziz Univ, Coll Business Adm, MIS Dept, Alkharj 11942, Saudi Arabia
[4] Princess Nourah Bint Abdulrahman Univ, Coll Sci, Dept Math Sci, Riyadh 84428, Saudi Arabia
[5] Super Univ, Dept Software Engn, Lahore 54000, Pakistan
关键词
E-health; role-based access control; trust; cloud environment; data management; IEEE; health issue; CONTROL MODEL; CARE; SECURITY; CONTEXT; RISK;
D O I
10.1109/ACCESS.2023.3335984
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's world, services are improved and advanced in every field of life. Especially in the health sector, information technology (IT) plays a vigorous role in electronic health (e-health). To achieve benefits from e-health, its cloud-based implementation is necessary. With this environment's multiple benefits, privacy and security loopholes exist. As the number of users grows, the Electronic Healthcare System's (EHS) response time becomes slower. This study presented a trust mechanism for access control (AC) known as role-based access control (RBAC) to address this issue. This method observes the user's behavior and assigns roles based on it. The AC module has been implemented using SQL Server, and an administrator develops controls for users with roles and access to multiple EHS modules. To validate the user's trust value, A.net-based framework has been introduced. The framework of e-health proposed in this research ensures that users can protect their data from intruders and other security threats.
引用
收藏
页码:138813 / 138826
页数:14
相关论文
共 50 条
  • [1] Anonymous Role-Based Access Control on E-Health Records
    Zhou, Xingguang
    Liu, Jianwei
    Liu, Weiran
    Wu, Qianhong
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 559 - 570
  • [2] A Trust-based Access Control Scheme for e-Health Cloud
    Ben Daoud, Wided
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    2018 IEEE/ACS 15TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2018,
  • [3] Role-based Access Control Using Ontology in Cloud Storage
    Sun, Hong
    Zhang, Xueqin
    Gu, Chunhua
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 1 - 12
  • [4] Garbled role-based access control in the cloud
    Masoom Alam
    Naina Emmanuel
    Tanveer Khan
    Yang Xiang
    Houcine Hassan
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
  • [5] Garbled role-based access control in the cloud
    Alam, Masoom
    Emmanuel, Naina
    Khan, Tanveer
    Xiang, Yang
    Hassan, Houcine
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1153 - 1166
  • [6] A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 226 - 251
  • [7] Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control
    Abdul, Arif Mohammad
    Mohammad, Arshad Ahmad Khan
    Venkat Reddy, P.
    Nuthakki, Praveena
    Kancharla, Rakesh
    Joshi, Rahul
    Kannaiya Raja, N.
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [8] Integrating Trust with Cryptographic Role-based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 560 - 569
  • [9] Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2381 - 2395
  • [10] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment
    Bai, Xin
    2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20