An adaptive mutual trust based access control model for electronic healthcare system

被引:11
|
作者
Singh, Ashish [1 ]
Chatterjee, Kakali [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Patna 800005, Bihar, India
关键词
Access control; Electronic healthcare system (EHS); Mutual trust; Beta distribution (BD) technique; Access control rules; REPUTATION MANAGEMENT; SELECTION; PRIVACY; ERROR;
D O I
10.1007/s12652-019-01240-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing growth of the Electronic healthcare system (EHS), the security of the EHS is an essential requirement because different types of users (patient, doctor, nurse, etc.) are accessing these systems for various purposes like treatment, research, drug analysis, etc. In the EHS, two major security challenges arise. First one is the selection of an access control mechanism without any prior information about the healthcare users. The second one is how much amount of data will be shared by the healthcare services and practitioner. Hence, a suitable access control technique is essential which not only provides the static access but also dynamically control the views of the requested data, so that the information will be shared in a controlled manner. In the healthcare system, trust can be viewed as an important judgment parameter for controlling the access of different stakeholders as it is an open system with different types of users. The main aim of the work is to control the access view so that only authorized user can access the information in a controlled manner. It also improves adaptivity of the access control model by integration of dynamic trust degree of communicating parties. To fulfill the above-discussed security requirements, in this paper, we have proposed an access control model, which is based on the trust degree of the healthcare user and service, named as mutual trust. The assessment of user and service trust degree is based on the beta distribution technique. A rule set has been developed based on this mutual trust degree to control the data access view, which is dynamically changed with the communicating parties trust level. The detail implementation of the proposed model shows that the accuracy and efficiency of the model are better as compared to other models.
引用
收藏
页码:2117 / 2136
页数:20
相关论文
共 50 条
  • [21] A trust-based access control model for virtual organizations
    Lin, Aizhong
    Vullings, Erik
    Dalziel, James
    GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, 2006, : 557 - +
  • [22] A Trust and Context Based Access Control Model for Distributed Systems
    Feng, Fujun
    Lin, Chuang
    Peng, Dongsheng
    Li, Junshan
    HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 629 - +
  • [23] A Novel Trust Based Access Control Model for Cloud Environment
    Behera, Pratap Kumar
    Khilar, Pabitra Mohan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 1, 2017, 395 : 285 - 295
  • [24] Access Control Model Based on Trust and Risk Evaluation in IDMaaS
    Liu, Fei
    Wang, Jing
    Bai, Hongtao
    Sun, Huiping
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 179 - 184
  • [25] Trust-Based Fuzzy Access Control Model Research
    Su, Rina
    Zhang, Yongping
    He, Zhongkun
    Fan, Shaojing
    WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 393 - 399
  • [26] A Trust-and Property-based Access Control Model
    Biskup, Joachim
    Hielscher, Julia
    Wortmann, Sandra
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (02) : 169 - 177
  • [27] Trust-based access control model for grid applications
    Yao, Hanbing
    Liu, Yangjun
    Liu, Wei
    Li, Ruixuan
    DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 491 - 495
  • [28] TAPS: Trust-based Access Control and Protect System
    Yoo, Yoon-Sik
    Lee, Hyungkyu
    Jung, Boo-Geum
    Park, HeaSook
    Kim, Kiwon
    Park, Cheong Hee
    2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 71 - 75
  • [29] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [30] Adjustable trust model for access control
    Komarova, Maryna
    Riguidel, Michel
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 429 - 443