An adaptive mutual trust based access control model for electronic healthcare system

被引:11
|
作者
Singh, Ashish [1 ]
Chatterjee, Kakali [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Patna 800005, Bihar, India
关键词
Access control; Electronic healthcare system (EHS); Mutual trust; Beta distribution (BD) technique; Access control rules; REPUTATION MANAGEMENT; SELECTION; PRIVACY; ERROR;
D O I
10.1007/s12652-019-01240-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing growth of the Electronic healthcare system (EHS), the security of the EHS is an essential requirement because different types of users (patient, doctor, nurse, etc.) are accessing these systems for various purposes like treatment, research, drug analysis, etc. In the EHS, two major security challenges arise. First one is the selection of an access control mechanism without any prior information about the healthcare users. The second one is how much amount of data will be shared by the healthcare services and practitioner. Hence, a suitable access control technique is essential which not only provides the static access but also dynamically control the views of the requested data, so that the information will be shared in a controlled manner. In the healthcare system, trust can be viewed as an important judgment parameter for controlling the access of different stakeholders as it is an open system with different types of users. The main aim of the work is to control the access view so that only authorized user can access the information in a controlled manner. It also improves adaptivity of the access control model by integration of dynamic trust degree of communicating parties. To fulfill the above-discussed security requirements, in this paper, we have proposed an access control model, which is based on the trust degree of the healthcare user and service, named as mutual trust. The assessment of user and service trust degree is based on the beta distribution technique. A rule set has been developed based on this mutual trust degree to control the data access view, which is dynamically changed with the communicating parties trust level. The detail implementation of the proposed model shows that the accuracy and efficiency of the model are better as compared to other models.
引用
收藏
页码:2117 / 2136
页数:20
相关论文
共 50 条
  • [41] A Trust-Game-Based Access Control Model for Cloud Service
    Pan Jun, Sun
    MOBILE INFORMATION SYSTEMS, 2020, 2020
  • [42] Trust and Risk Based on Access Control Model in Social Internet of Things
    Zhang, Hongbin
    Liu, Jian
    Zhao, Dongmei
    Liu, Bin
    Wang, Yanmei
    Fan, Fan
    International Journal of Network Security, 2023, 25 (05) : 736 - 744
  • [43] A Model for Trust-Based Access Control and Delegation in Mobile Clouds
    Ray, Indrajit
    Mulamba, Dieudonne
    Ray, Indrakshi
    Han, Keesook J.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 242 - 257
  • [44] Trust Calculation and Delivery Control in Trust-Based Access Control
    LEI Jianyun1
    2. School of Computer Science
    Wuhan University Journal of Natural Sciences, 2008, (06) : 765 - 768
  • [45] A Cross-Domain Access Control Model Based on Trust Measurement
    YANG Xiaohui
    WANG Hong
    Wuhan University Journal of Natural Sciences, 2016, 21 (01) : 21 - 28
  • [46] Trust-Compensation-Based Access Control Model for Web Services
    Yan Danfeng
    Sun Jing
    Zhang Liying
    Yang Fangchun
    CHINA COMMUNICATIONS, 2012, 9 (12) : 8 - 21
  • [47] A trust-role based context aware access control model
    Chen Lu
    Zhou Qing
    Huang Gao-feng
    Zhang Li-qiang
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 371 - 376
  • [48] An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system
    Smari, Waleed W.
    Clemente, Patrice
    Lalande, Jean-Francois
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 31 : 147 - 168
  • [49] Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV
    Wang, Jiuru
    Wang, Zhiyuan
    Song, Jingcheng
    Cheng, Hongyuan
    ELECTRONICS, 2023, 12 (23)
  • [50] Blockchain-enabled IoT access control model for sharing electronic healthcare data
    Ilyas B.
    Kumar A.
    Ali S.M.
    Lei H.
    Multimedia Tools and Applications, 2025, 84 (10) : 8127 - 8148