An adaptive mutual trust based access control model for electronic healthcare system

被引:11
|
作者
Singh, Ashish [1 ]
Chatterjee, Kakali [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Patna 800005, Bihar, India
关键词
Access control; Electronic healthcare system (EHS); Mutual trust; Beta distribution (BD) technique; Access control rules; REPUTATION MANAGEMENT; SELECTION; PRIVACY; ERROR;
D O I
10.1007/s12652-019-01240-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing growth of the Electronic healthcare system (EHS), the security of the EHS is an essential requirement because different types of users (patient, doctor, nurse, etc.) are accessing these systems for various purposes like treatment, research, drug analysis, etc. In the EHS, two major security challenges arise. First one is the selection of an access control mechanism without any prior information about the healthcare users. The second one is how much amount of data will be shared by the healthcare services and practitioner. Hence, a suitable access control technique is essential which not only provides the static access but also dynamically control the views of the requested data, so that the information will be shared in a controlled manner. In the healthcare system, trust can be viewed as an important judgment parameter for controlling the access of different stakeholders as it is an open system with different types of users. The main aim of the work is to control the access view so that only authorized user can access the information in a controlled manner. It also improves adaptivity of the access control model by integration of dynamic trust degree of communicating parties. To fulfill the above-discussed security requirements, in this paper, we have proposed an access control model, which is based on the trust degree of the healthcare user and service, named as mutual trust. The assessment of user and service trust degree is based on the beta distribution technique. A rule set has been developed based on this mutual trust degree to control the data access view, which is dynamically changed with the communicating parties trust level. The detail implementation of the proposed model shows that the accuracy and efficiency of the model are better as compared to other models.
引用
收藏
页码:2117 / 2136
页数:20
相关论文
共 50 条
  • [31] Behavior Trust Prediction and Control Based on Electronic Commerce System
    Rao Li-Ping
    He Ming
    Huang Song
    Bao Rui
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 563 - +
  • [32] Behavior trust prediction and control based on electronic commerce system
    Institute Command Automation, PLA Science and Technology University, 210007 Nanjing, China
    不详
    不详
    不详
    Int. Conf. E-Bus. Inf. Syst. Secur., EBISS, 2009,
  • [33] A trust fine-grained access control model for ERP system
    Jiang, Z. L.
    Feng, S. H.
    Qi, M. F.
    Li, Z. Q.
    E-ENGINEERING & DIGITAL ENTERPRISE TECHNOLOGY, 2008, 10-12 : 767 - +
  • [34] Adaptive Content-Aware Access Control of EPR Resource in a Healthcare System
    Sharathkumar, S.
    Jagadamba, G.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 205 - 210
  • [35] Trust and Risk based Access Control and Access Control Constraints
    Helil, Nurmamat
    Kim, Mucheol
    Han, Sangyong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (11): : 2254 - 2271
  • [36] A State-Adaptive Access Control Model for Web-based IDRS System
    Wu, Xinsong
    He, Yeping
    Zhou, Zhouyi
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 172 - 175
  • [37] Trust based Authorization and Access Control
    Feng Fujun
    Li Junshan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 162 - 165
  • [38] RBF Networks-Based Adaptive Inverse Model Control System for Electronic Throttle
    Yuan Xiaofang
    Wang Yaonan
    Sun Wei
    Wu Lianghong
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2010, 18 (03) : 750 - 756
  • [39] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
  • [40] A Trust and Reputation-based Access Control Model for Virtual Organizations
    Arasteh, Majid
    Amini, Morteza
    Jalili, Rasool
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 121 - 127