Sabiá: an authentication, authorization, and user data delivery architecture based on user consent for health information systems in Brazil

被引:0
|
作者
de Paiva Marques Carvalho T. [1 ,2 ]
de Paiva J.C. [1 ,2 ]
de Medeiros Valentim R.A. [1 ]
Silva C.B.P. [2 ]
de Lima D.F. [1 ]
Silva E.C. [1 ]
机构
[1] Laboratory for Technological Innovation in Healthcare (LAIS), Federal University of Rio Grande do Norte (UFRN), R. Dr. Nilo Bezerra Ramalho, 1692 - Tirol, Natal, 59015-300, RN
[2] Federal Institute of Rio Grande do Norte (IFRN), R. Dr. Nilo Bezerra Ramalho, 1692 - Tirol, Natal, 59015-300, RN
关键词
Authentication; Authorization; Health information systems; Interoperability; User consent;
D O I
10.1007/s42600-020-00058-8
中图分类号
学科分类号
摘要
Purpose: Health information systems in Brazil have been designed and developed in a heterogeneous manner based on local regional characteristics, resulting in a lack of health information integrity. In this context, the Brazilian Ministry of Health pointed out the need for interoperability solutions of health information systems, noting the importance of integration with national databases and alignment with Brazilian data protection laws. Therefore, this paper presents Sabiá, a platform for authentication, authorization, and data delivery based on user consent for health information systems in Brazil. Methods: Sabiá’s architecture is designed to achieve the following requirements: (R1) Provide a Federated Identity; (R2) Be a Federated Resource Manager; (R3) Collect user data from different information systems; and (R4) Deliver user data to systems based on user consent. Sabiá consists of three main components: (1) Sabiá Authorization Server, responsible for implementing Open Authentication; (2) Sabiá Collector, responsible for collecting data from different information systems; and (3) Sabiá Resource Server, responsible for delivering data previously authorized by the user to the systems. Results: After analyzing historical data, R4 functionality was selected to be submitted to performance testing because it is the process that most affects overall system performance. The tests aimed at analyzing Sabiá’s behavior in the heaviest scenario based on historical data. Conclusion: The results showed no flaws and indicated system stability and consistency, in which the user perceives a system reaction instantaneous, whose response time averages remained below 100 ms. © 2020, Sociedade Brasileira de Engenharia Biomedica.
引用
收藏
页码:197 / 202
页数:5
相关论文
共 50 条
  • [11] Software and hardware user authentication methods in the information and control systems based on biometrics
    Boriev, Z.
    Nyrkov, A.
    Sokolov, S.
    Chernyi, S.
    INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING, AUTOMATION AND CONTROL SYSTEMS 2015 (MEACS2015), 2016, 124
  • [12] Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History
    Bucko, Ahmet
    Vishi, Kamer
    Krasniqi, Bujar
    Rexha, Blerim
    COMPUTERS, 2023, 12 (04)
  • [13] RFID Authentication System Based on User Biometric Information
    Huang, Yuanmu
    Fu, Bin
    Peng, Ningwei
    Ba, Yanwen
    Liu, Xuan
    Zhang, Shigeng
    APPLIED SCIENCES-BASEL, 2022, 12 (24):
  • [14] A Survey of User Authentication Based on Channel State Information
    Wang, Zhengjie
    Dou, Wenwen
    Ma, Mingjing
    Feng, Xiaoxue
    Huang, Zehua
    Zhang, Chengming
    Guo, Yinjing
    Chen, Da
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [15] A unified user consent acquisition and delivery mechanism for multi-source user data integrated service
    Cho, Youngseob
    Cho, Sangrae
    Jin, Seung-Hun
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 309 - 315
  • [16] An Improved User Authentication Scheme for Telecare Medical Information Systems
    Madhusudhan, R.
    Nayak, Chaitanya S.
    2018 IEEE/ACM INTERNATIONAL CONFERECE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2018, : 100 - 105
  • [17] Information Technology of User Authentication in Cross-Platform Systems
    Krylov, Victor
    Volkova, Natalya
    Kozina, Yuliya
    PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 2, 2017, : 952 - 954
  • [18] An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems
    Giri, Debasis
    Maitra, Tanmoy
    Amin, Ruhul
    Srivastava, P. D.
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (01)
  • [19] An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems
    Debasis Giri
    Tanmoy Maitra
    Ruhul Amin
    P. D. Srivastava
    Journal of Medical Systems, 2015, 39
  • [20] The House That Knows You: User Authentication Based on IoT Data
    Ongun, Talha
    Oprea, Alina
    Nita-Rotaru, Cristina
    Christodorescu, Mihai
    Salajegheh, Negin
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2255 - 2257