Secure Healthcare Access Control System (SHACS) for Anomaly Detection and Enhanced Security in Cloud-Based Healthcare Applications

被引:0
作者
Sangeetha, S. K. B. [1 ]
Selvarathi, C. [2 ]
Mathivanan, Sandeep Kumar [3 ]
Cho, Jaehyuk [4 ]
Easwaramoorthy, Sathishkumar Veerappampalayam [5 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Vadapalani Campus, Chennai 600026, Tamil Nadu, India
[2] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci & T, Dept Comp Sci & Engn, Chennai 600062, Tamil Nadu, India
[3] Galgotias Univ, Dept Comp Sci & Engn, Greater Noida 203201, India
[4] Jeonbuk Natl Univ, Dept Software Engn, Div Elect & Informat Engn, Jeonju 54896, South Korea
[5] Sunway Univ, Sch Engn & Technol, Petaling Jaya 47500, Selangor, Malaysia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Medical services; Access control; Security; Cloud computing; Real-time systems; Organizations; Authentication; Protocols; Process control; Machine learning; Healthcare access control; attribute-based access control (ABAC); cloud security; electronic health records (EHR); authentication efficiency; INTRUSION DETECTION SYSTEM;
D O I
10.1109/ACCESS.2024.3492024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing reliance on distributed cloud technology in mobile healthcare applications has introduced critical challenges in ensuring secure and efficient access to Electronic Health Records (EHR). Traditional methods have prolonged authentication times and access delays, compromising both the efficiency and security of healthcare systems. To address these issues, this study proposes the Secure Healthcare Access Control System (SHACS), a robust framework specifically designed to enhance security and efficiency in healthcare environments. SHACS provides a sophisticated combination of role-based access control, attribute-based policies, and dynamic rules to streamline authentication processes and safeguard data access. SHACS architecture provides the central authority and system authorities, responsible for enforcing access control policies and verifying the authenticity of users requesting access to medical records. SHACS also integrates real-time anomaly detection capabilities, utilizing the MIMIC-III dataset to identify and respond to unusual access patterns, thereby mitigating potential security breaches. Following successful authentication, SHACS generates secure decryption tokens and keys, enabling swift and secure access to EHRs while continuously updating a dynamic access list to monitor and reduce access delays. Experimental results demonstrate that SHACS significantly improves system performance, reducing authentication times by 30% and access delays by 25% compared to traditional methods. For instance, SHACS decreased the average authentication time from 40 seconds to 28 seconds and enhanced system responsiveness, lowering average access delays from 15 seconds to 11 seconds. The implementation of SHACS underscores the importance of privacy-enhancing technologies in safeguarding medical records, ensuring that only authorized personnel access sensitive data. Through rigorous testing and analysis, SHACS proves its efficacy in strengthening the security posture of cloud-based healthcare systems, ultimately contributing to the quality and accessibility of remote healthcare services.
引用
收藏
页码:164543 / 164559
页数:17
相关论文
共 24 条
  • [1] The application of internet of things in healthcare: a systematic literature review and classification
    Ahmadi, Hossein
    Arji, Goli
    Shahmoradi, Leila
    Safdari, Reza
    Nilashi, Mehrbakhsh
    Alizadeh, Mojtaba
    [J]. UNIVERSAL ACCESS IN THE INFORMATION SOCIETY, 2019, 18 (04) : 837 - 869
  • [2] Secure Edge of Things for Smart Healthcare Surveillance Framework
    Alabdulatif, Abdulatif
    Khalil, Ibrahim
    Yi, Xun
    Guizani, Mohsen
    [J]. IEEE ACCESS, 2019, 7 : 31010 - 31021
  • [3] Anitha C., 2023, P 3 INT C INN PRACT, P1
  • [4] Aravindhan K., 2022, 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS), P1654, DOI 10.1109/ICACCS54159.2022.9785303
  • [5] Chacko A., 2018, EAI ENDORSED T PERVA
  • [6] Dhaya R, 2017, INT CONF ADVAN COMPU
  • [7] A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks
    Fang, Liming
    Li, Yang
    Liu, Zhe
    Yin, Changchun
    Li, Minghui
    Cao, Zehong Jimmy
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) : 4260 - 4269
  • [8] Secure data authentication and access control protocol for industrial healthcare system
    Gupta D.S.
    Mazumdar N.
    Nag A.
    Singh J.P.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (05) : 4853 - 4864
  • [9] Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
    Hady, Anar A.
    Ghubaish, Ali
    Salman, Tara
    Unal, Devrim
    Jain, Raj
    [J]. IEEE ACCESS, 2020, 8 : 106576 - 106584
  • [10] Hounaida Frikha, 2020, 2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), P124, DOI 10.1109/WETICE49692.2020.00032