HECC based Patient Privacy Preserving Access Control Model

被引:0
|
作者
Prasanalakshmi, B. [1 ]
Pugalendhi, Ganesh Kumar [2 ]
机构
[1] King Khalid Univ, Abha, Saudi Arabia
[2] Anna Univ, Madras, Tamil Nadu, India
关键词
Hyper Elliptic curve cryptography; Electronic health record; Access control model; Situation based access control model; Patient centric privacy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An Electronic patient medical record monitoring system has been actively developed and implemented in many countries with their own principles on implementation. Even though the history of implementation goes back to years, it is true that it has not yet completed its development stage. Still the system lags with some drawbacks and limitations. This paper discusses and describes the implementation of an Access control model that purely concentrates on the privacy preserving aspects of the patients with access control policies described. The Access control model proposed takes into concern the situation-based model also. This situation-based model takes into concern the authorization of the relatives or the family physician when a situation arises for the patient to authenticate the emergency doctor to retrieve his medical records. Also, a biometric authentication of the patient or the authorizing (relatives or the family physician) person is proposed to be unique and fast enough so that the data is retrieved only on the authorization of the concerned person. This system proves a highest level of privacy in concern with the medical records of a patient. Also, the Hyper Elliptic curve cryptography enhances the security level in authentication.
引用
收藏
页码:50 / 53
页数:4
相关论文
共 50 条
  • [1] Delegation of access rights in a privacy preserving access control model
    Moniruzzaman, Md
    Barker, Ken
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 124 - 133
  • [2] Privacy Preserving Delegated Access Control in the Storage as a Service Model
    Nabeel, Mohamed
    Bertino, Elisa
    2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, : 645 - 652
  • [3] An Integrated Privacy Preserving Attribute Based Access Control Framework
    Xu, Runhua
    Joshi, James B. D.
    PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2016, : 68 - 76
  • [4] Location Based Privacy Preserving Access Control for Relational Data
    Lakadkutta, Ahmed H. I.
    Mante, R. V.
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 2083 - 2087
  • [5] Multilayer privacy-preserving model for security and privacy access control in edge computing
    Karthikeyan, K.
    Madhavan, P.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (10):
  • [6] Privacy-Preserving Access Control Model for Big Data Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 130 - 135
  • [7] Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT
    Ouaddah, Aafaf
    Abou Elkalam, Anas
    Ouahman, Abdellah Ait
    EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 523 - 533
  • [8] A privacy preserving access control mechanism for network-based database
    Rui, Fan
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 435 - 439
  • [9] Trust Based Privacy Preserving Access Control In Web Services Paradigm
    Bhatia, Rekha
    Singh, Manpreet
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 243 - 246
  • [10] Token based Privacy Preserving Access Control in Wireless Sensor Networks
    Tanuja, R.
    Shruthi, Y. R.
    Manjula, S. H.
    Venugopal, K. R.
    Patnaik, L. M.
    2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS (ADCOM), 2015, : 45 - 50