A Role and Activity Based Access Control for Secure Healthcare Systems

被引:8
|
作者
Pulur, Naim Alperen [1 ]
Altop, Duygu Karaoglan [1 ]
Levi, Albert [1 ]
机构
[1] Sabanci Univ, Istanbul, Turkey
来源
关键词
D O I
10.1007/978-3-319-22635-4_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a novel access control mechanism in order to safeguard privacy of medical data of patients in dynamic environments. Our access control model takes advantages from role-based access control (RBAC) and criticality aware access control (CAAC). In this way, our original approach allows the medical professionals with different roles to be granted access to medical records of patients automatically and without explicit request in case of a medical emergency. In this context, we design secure and privacy aware protocols from initial login to patients' medical data transmission and retrieval by the medical professionals. Moreover, we formally define access control policies for our system. Finally we show the feasibility of our approach by implementation and performance evaluation.
引用
收藏
页码:93 / 103
页数:11
相关论文
共 50 条
  • [11] A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR
    Tomur, E.
    Deregozu, R.
    Genc, T.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 18, 2006, 18 : 58 - 63
  • [12] Behavior-based access control for distributed healthcare systems
    Yarmand, Mohammad
    Sartipi, Kamran
    Down, Douglas
    JOURNAL OF COMPUTER SECURITY, 2013, 21 (01) : 1 - 39
  • [13] Secure IoT Healthcare Architecture with Deep Learning-Based Access Control System
    Thilagam, K.
    Beno, A.
    Lakshmi, M. Vanitha
    Wilfred, C. Bazil
    George, Santhi M.
    Karthikeyan, M.
    Peroumal, Vijayakumar
    Ramesh, C.
    Karunakaran, Prabakaran
    JOURNAL OF NANOMATERIALS, 2022, 2022
  • [14] A Secure Blockchain-Based Access Control Architecture for IoT-Healthcare Applications
    Raj, Anu
    Prakash, Shiva
    NATIONAL ACADEMY SCIENCE LETTERS-INDIA, 2024, 47 (05): : 529 - 537
  • [15] A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain
    Omran, Esraa
    Grandison, Tyrone
    Nelson, David
    Bokma, Albert
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (03) : 36 - 52
  • [16] Secure access control for location-based applications in WLAN systems
    Cho, YounSun
    Bao, Lichun
    2006 IEEE INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2006, : 842 - +
  • [17] A role based access control model for agent based control systems
    Drouineaud, M
    Lüder, A
    Sohr, K
    INDIN 2003: IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, PROCEEDINGS, 2003, : 307 - 311
  • [18] Secure PHR Access Control Scheme for Healthcare Application Clouds
    Liu, Chia-Hui
    Lin, Fong-Qi
    Chiang, Dai-Lun
    Chen, Tzer-Long
    Chen, Chin-Sheng
    Lin, Han-Yu
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    2013 42ND ANNUAL INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP), 2013, : 1067 - 1076
  • [19] Integration of Role Based Access Control with Homomorphic Cryptosystem for Secure and Controlled Access of Data in Cloud
    Sethi, Kamalakanta
    Chopra, Anish
    Bera, Padmalochan
    Tripathy, Bata Krishna
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 194 - 199
  • [20] Secure administration of cryptographic role-based access control for large-scale cloud storage systems
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (08) : 1518 - 1533