ANALYSIS OF TIME BOUND COLLABORATIVE ACCESS CONTROL DELEGATION MODEL IN ELECTRONIC HEALTH RECORDS

被引:0
作者
Kalpana, C. [1 ]
Revathy, S. [2 ]
机构
[1] Rajiv Gandhi Coll Engn & Technol, Dept Comp Applicat, Pondicherry, India
[2] Sathyabama Univ, Dept Informat Technol, Madras, Tamil Nadu, India
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC) | 2017年
关键词
Electronic Health Record; Access Control; Privacy Preserving; Time Bound; Authentication;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Electronic Health Records (EHR) is the digital record shared across multiple users like hospital, personal physicians, researchers, insurance companies and many. Such a scenario of data sharing attracts much attention towards security and privacy of their own medical records. These data are patient centric and patients are very much concerned towards the limitations in sharing of their own medical records. We present a time bound combined access control model which provides concerns on spatial dimensions and time constraints to concern over temporal dimensions. This model aims in providing privacy since dynamic key creation and distribution is included based on the time constraint using a new key assignment scheme suitable for hierarchical systems. The research focus will be on insisting the importance of the role of Delegation and Access Control in Health care. Time Bound Access Control is to be proposed and concentrated much on developing and implementing algorithms related to combining various access controls techniques as a time bound delegation model. Combining privacy policy through an analyzer will control the access of data, which gives the privacy of the data.
引用
收藏
页码:424 / 429
页数:6
相关论文
共 15 条
  • [1] Bhartiya Shalini, ELSEVIER J COMPUTER
  • [2] Ding MZ, 2012, PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2012), P526, DOI 10.1109/ICNIDC.2012.6418809
  • [3] Echizenb Isao, 2010, ASPECTS PRIVACY ELEC
  • [4] Gkoulalas Aris, 2014, J BIOMEDICAL INFORM
  • [5] Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage
    Guo, Lifeng
    Yau, Wei-Chuen
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (02)
  • [6] A New Public Key Encryption with Conjunctive Field Keyword Search Scheme
    Hwang, Min-Shiang
    Hsu, Shih-Ting
    Lee, Cheng-Chi
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (03): : 277 - 288
  • [7] Ivy Joy G., 2013, IEEE C PUBLICATIONS
  • [8] Mario Sicuranza Institute for High Performance Computing and Networking of the Italian National Research Council Angelo Esposito Institute for High Performance Computing and Networking of the Italian National Research Council, 2013, IEEE INT C INT TECHN
  • [9] Nafiseh Kahani School of Computing Queen's University Canada Khalid Elgazzar School of Computer Science Carnegie Mellon University USA James R. Cordy School of Computing Queen's University Canada, 2016, AUTH ACC CONTR E HLT
  • [10] Premarathne Uthpala, 2016, HYBRID CRYPTOGRAPHIC