Security and Complexity Analysis of User and Data based Access Control (UDBAC) Model

被引:0
|
作者
Asija, Ruchika [1 ]
Nallusamy, Rajarathnam [2 ]
机构
[1] Indira Gandhi Natl Open Univ IGNOU, Sch Comp & Informat Sci SOCIS, New Delhi, India
[2] Embnol Solut Private Ltd, Bangalore, Karnataka, India
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Health Information System is a composite environment with many types of users and confidential data. To protect the confidentiality of this data and privacy of users, healthcare organizations need to have a flexible and line-grained approach depending on the dynamic role, interacting with this data on daily-basis. Access control is one such mechanism, which prevents any unauthorized user to access the data to protect the security and privacy of healthcare data. Several access control models like Role-Based Access Control (RBAC) model were devised, but due to their complex nature, it is difficult to apply them in any access control policy. It puts security and privacy of health data at risk. To address these risks, this paper presents a User and Data Based Access Control Model (UDBAC) that is integrated with a Healthcare Markup Language (HML) to provide built-in security and privacy enhancing mechanism. UDBAC model attaches security levels within the HML Schema with a mandatory safety condition, providing enhanced security and privacy with less complexity. The paper also analyses the complexity and security metrics for the UDBAC model in comparison with RBAC model, and shows that UDBAC model is more secure, less complex and can be easily incorporated in an access control policy. Based on the security analysis, this paper also analyses the confidentiality, integrity and availability impacts on the UDBAC model in health information system if any vulnerability enters into the system.
引用
收藏
页码:358 / 366
页数:9
相关论文
共 50 条
  • [1] An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility
    Voloch, Nadav
    Levy, Priel
    Elmakies, Mor
    Gudes, Ehud
    [J]. CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2019, 2019, 11527 : 156 - 168
  • [2] Lattice based access control for protecting user data in cloud environments with hybrid security
    Saravanan, N.
    Umamakeswari, A.
    [J]. COMPUTERS & SECURITY, 2021, 100
  • [3] Security analysis of access control model in hybrid cloud based on security entropy
    车天伟
    Ma Jianfeng
    Li Na
    Wang Chao
    [J]. High Technology Letters, 2015, 21 (02) : 200 - 204
  • [4] Knowledge Based Access Control a model for security and privacy in the Big Data
    El haourani, Lamia
    Abou elkalam, Anas
    Ouahman, Abdelah Ait
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA'18), 2018,
  • [5] Security analysis of Mandatory Access Control Model
    Jiang, YX
    Lin, CC
    Yin, H
    Tan, ZX
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5013 - 5018
  • [6] The Cloud Data Security and Access Control Model in the Study
    Dong, Jing
    [J]. PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 498 - 500
  • [7] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [8] Analysis of Access Control Model for Data Security and Privacy on Multi-Tenant SaaS
    Duraisamy, Gunavathi
    Abd Ghani, Abdul Azim
    Zulzalil, Hazura
    Abdullah, Azizol
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (03) : 1619 - 1622
  • [9] Dyacon: JointCloud Dynamic Access Control Model of Data Security Based on Verifiable Credentials
    Zhong, Tao
    Chang, Junsheng
    Shi, Peichang
    Li, Linhui
    Gao, Fei
    [J]. 19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 336 - 343
  • [10] Comparative Analysis of Ontology Based Data Access Control and Security Enhancement in Healthcare Application
    Renuka, Suthan
    Guruprakash, Chirathally Dyamanna
    [J]. OPTOELECTRONICS INSTRUMENTATION AND DATA PROCESSING, 2024, 60 (02) : 297 - 307