An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment

被引:4
|
作者
Butt, Ateeq Ur Rehman [1 ]
Mahmood, Tariq [1 ,2 ]
Saba, Tanzila [1 ]
Bahaj, Saeed Ali Omer [3 ]
Alamri, Faten S. [4 ]
Iqbal, Muhammad Waseem [5 ]
Khan, Amjad R. [2 ]
机构
[1] Prince Sultan Univ, Artificial Intelligence & Data Analyt AIDA Lab, CCIS, Riyadh 11586, Saudi Arabia
[2] Univ Educ Vehari Campus, Fac Informat Sci, Vehari 61100, Pakistan
[3] Prince Sattam bin Abdulaziz Univ, Coll Business Adm, MIS Dept, Alkharj 11942, Saudi Arabia
[4] Princess Nourah Bint Abdulrahman Univ, Coll Sci, Dept Math Sci, Riyadh 84428, Saudi Arabia
[5] Super Univ, Dept Software Engn, Lahore 54000, Pakistan
关键词
E-health; role-based access control; trust; cloud environment; data management; IEEE; health issue; CONTROL MODEL; CARE; SECURITY; CONTEXT; RISK;
D O I
10.1109/ACCESS.2023.3335984
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's world, services are improved and advanced in every field of life. Especially in the health sector, information technology (IT) plays a vigorous role in electronic health (e-health). To achieve benefits from e-health, its cloud-based implementation is necessary. With this environment's multiple benefits, privacy and security loopholes exist. As the number of users grows, the Electronic Healthcare System's (EHS) response time becomes slower. This study presented a trust mechanism for access control (AC) known as role-based access control (RBAC) to address this issue. This method observes the user's behavior and assigns roles based on it. The AC module has been implemented using SQL Server, and an administrator develops controls for users with roles and access to multiple EHS modules. To validate the user's trust value, A.net-based framework has been introduced. The framework of e-health proposed in this research ensures that users can protect their data from intruders and other security threats.
引用
收藏
页码:138813 / 138826
页数:14
相关论文
共 50 条
  • [1] A Trust-based Access Control Scheme for e-Health Cloud
    Ben Daoud, Wided
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    2018 IEEE/ACS 15TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2018,
  • [2] Access Control Model for E-Health in a Cloud-Based Environment for HIV Patients in South Africa
    Azeez, Nureni Ayofe
    Van der Vyver, Charles
    2018 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2018,
  • [3] Provisioning trust-oriented role-based access control for maintaining data integrity in cloud
    Saxena, Urvashi Rahul
    Alam, Taj
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023, 14 (06) : 2559 - 2578
  • [4] Context-Based E-Health System Access Control Mechanism
    Al-Neyadi, Fahed
    Abawajy, Jemal H.
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 68 - 77
  • [5] Provisioning trust-oriented role-based access control for maintaining data integrity in cloud
    Urvashi Rahul Saxena
    Taj Alam
    International Journal of System Assurance Engineering and Management, 2023, 14 (6) : 2559 - 2578
  • [6] Efficient and Flexible Role-Based Access Control (EF-RBAC) Mechanism for Cloud
    Harnal, Shilpi
    Chauhan, R. K.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2020, 7 (26) : 1 - 10
  • [7] Garbled role-based access control in the cloud
    Masoom Alam
    Naina Emmanuel
    Tanveer Khan
    Yang Xiang
    Houcine Hassan
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
  • [8] Garbled role-based access control in the cloud
    Alam, Masoom
    Emmanuel, Naina
    Khan, Tanveer
    Xiang, Yang
    Hassan, Houcine
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1153 - 1166
  • [9] A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 226 - 251
  • [10] Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2381 - 2395