An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment

被引:10
作者
Butt, Ateeq Ur Rehman [1 ]
Mahmood, Tariq [1 ,2 ]
Saba, Tanzila [1 ]
Bahaj, Saeed Ali Omer [3 ]
Alamri, Faten S. [4 ]
Iqbal, Muhammad Waseem [5 ]
Khan, Amjad R. [2 ]
机构
[1] Prince Sultan Univ, Artificial Intelligence & Data Analyt AIDA Lab, CCIS, Riyadh 11586, Saudi Arabia
[2] Univ Educ Vehari Campus, Fac Informat Sci, Vehari 61100, Pakistan
[3] Prince Sattam bin Abdulaziz Univ, Coll Business Adm, MIS Dept, Alkharj 11942, Saudi Arabia
[4] Princess Nourah Bint Abdulrahman Univ, Coll Sci, Dept Math Sci, Riyadh 84428, Saudi Arabia
[5] Super Univ, Dept Software Engn, Lahore 54000, Pakistan
关键词
E-health; role-based access control; trust; cloud environment; data management; IEEE; health issue; CONTROL MODEL; CARE; SECURITY; CONTEXT; RISK;
D O I
10.1109/ACCESS.2023.3335984
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's world, services are improved and advanced in every field of life. Especially in the health sector, information technology (IT) plays a vigorous role in electronic health (e-health). To achieve benefits from e-health, its cloud-based implementation is necessary. With this environment's multiple benefits, privacy and security loopholes exist. As the number of users grows, the Electronic Healthcare System's (EHS) response time becomes slower. This study presented a trust mechanism for access control (AC) known as role-based access control (RBAC) to address this issue. This method observes the user's behavior and assigns roles based on it. The AC module has been implemented using SQL Server, and an administrator develops controls for users with roles and access to multiple EHS modules. To validate the user's trust value, A.net-based framework has been introduced. The framework of e-health proposed in this research ensures that users can protect their data from intruders and other security threats.
引用
收藏
页码:138813 / 138826
页数:14
相关论文
共 52 条
[1]   An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud [J].
Alharbe, Nawaf ;
Aljohani, Abeer ;
Rakrouki, Mohamed Ali ;
Khayyat, Mashael .
APPLIED SCIENCES-BASEL, 2023, 13 (05)
[2]   A novel predicate based access control scheme for cloud environment using open stack swift storage [J].
Anilkumar, Chunduru ;
Subramanian, Sumathy .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) :2372-2384
[3]   Access control for smarter healthcare using policy spaces [J].
Ardagna, Claudio A. ;
di Vimercati, Sabrina De Capitani ;
Foresti, Sara ;
Grandison, Tyrone W. ;
Jajodia, Sushil ;
Samarati, Pierangela .
COMPUTERS & SECURITY, 2010, 29 (08) :848-858
[4]   Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR [J].
Ashtiani, Mehrdad ;
Azgomi, Mohammad Abdollahi .
SOFT COMPUTING, 2016, 20 (01) :399-421
[5]   Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model [J].
Atlam, Hany F. ;
Azad, Muhammad Ajmal ;
Fadhel, Nawfal F. .
SENSORS, 2022, 22 (05)
[6]   Risk-Based Access Control Model: A Systematic Literature Review [J].
Atlam, Hany F. ;
Azad, Muhammad Ajmal ;
Alassafi, Madini O. ;
Alshdadi, Abdulrahman A. ;
Alenezi, Ahmed .
FUTURE INTERNET, 2020, 12 (06)
[7]   Hybrid machine learning approach for human activity recognition [J].
Azar, Ahmad Taher .
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2023, 72 (03) :231-239
[8]   Security and privacy issues in e-health cloud-based system: A comprehensive content analysis [J].
Azeez, Nureni Ayofe ;
Van der Vyver, Charles .
EGYPTIAN INFORMATICS JOURNAL, 2019, 20 (02) :97-108
[9]  
Banyal R. K., 2014, P INT C INF COMM TEC, P11
[10]   An Adaptation of Context and Trust Aware Workflow Oriented Access Control for Remote Healthcare [J].
Bhattasali, Tapalina ;
Chaki, Rituparna ;
Chaki, Nabendu ;
Saeed, Khalid .
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2018, 28 (06) :781-810