Blockchain-Based Access Control in a Globalized Healthcare Provisioning Ecosystem

被引:13
作者
Salonikias, Stavros [1 ]
Khair, Marie [2 ]
Mastoras, Theodoros [1 ]
Mavridis, Ioannis [1 ]
机构
[1] Univ Macedonia, Dept Appl Informat, Thessaloniki 54636, Greece
[2] Notre Dame Univ, Fac Nat & Appl Sci, Dept Comp Sci, POB 72, Zouk Mosbeh, Lebanon
关键词
access control; NGAC; blockchain; Ethereum; smart contracts; healthcare; IoMT; AUTHENTICATION; INTERNET; SYSTEMS;
D O I
10.3390/electronics11172652
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The COVID-19 pandemic further outlined the importance of global healthcare services provisioning for diagnosing and treating patients who tend to travel and live for large periods away from home and can be anywhere at any given time. Advances in technology enable healthcare practitioners to access critical data regarding a person's health status to provide better services. Medical data are sensitive in nature, and therefore, a reliable mechanism should ensure that only authorized entities can access data when needed. This paper, through a layered consideration of a Globalized Healthcare Provisioning Ecosystem (GHPE), reveals the interdependencies among its major components and suggests a necessary abstraction to identify requirements for the design of an access control suitable for the ecosystem. These requirements are imposed by the nature of the medical data as well as by the newly introduced potentials of Internet of Medical Things (IoMT) devices. As a result, an attribute-based access control framework is proposed aiming to provide prompt and secure access to medical data globally by utilizing state-of-the-art technologies and standards, including Next-Generation Access Control (NGAC), blockchain and smart contracts. Three types of smart contracts are proposed that enable access control to implement attribute and policy stores where policy classes and attributes are decentralized and immutable. In addition, the usage of blockchain-based distributed identities allows patients to be in control of access to their medical data and also enables healthcare service providers to access medical data promptly and reliably through the proposed access control framework. The qualitative characteristics of the proposed approach toward a decentralized and patient-centric access control in GHPE are demonstrated and discussed based on an application paradigm.
引用
收藏
页数:23
相关论文
共 65 条
[41]   A Blockchain Based Decentralized Identifiers for Entity Authentication in Electronic Health Records [J].
Manoj, T. ;
Makkithaya, Krishnamoorthi ;
Narendra, V. G. .
COGENT ENGINEERING, 2022, 9 (01)
[42]  
McCann J, 2018, I CONF SENS TECHNOL, P263, DOI 10.1109/ICSensT.2018.8603663
[43]   IP anycast - Point-to-(any) point communication [J].
Metz, C .
IEEE INTERNET COMPUTING, 2002, 6 (02) :94-98
[44]   A Survey of Blockchain From the Perspectives of Applications, Challenges, and Opportunities [J].
Monrat, Ahmed Afif ;
Schelen, Olov ;
Andersson, Karl .
IEEE ACCESS, 2019, 7 :117134-117151
[45]   Design a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for health record transaction in block chain [J].
Mubarakali A. ;
Bose S.C. ;
Srinivasan K. ;
Elsir A. ;
Elsier O. .
Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (Suppl 1) :59-59
[46]   A survey on essential components of a self-sovereign identity [J].
Muehle, Alexander ;
Gruener, Andreas ;
Gayvoronskaya, Tatiana ;
Meinel, Christoph .
COMPUTER SCIENCE REVIEW, 2018, 30 :80-86
[47]   FairAccess: a new Blockchain-based access control framework for the Internet of Things [J].
Ouaddah, Aafaf ;
Abou Elkalam, Anas ;
Ouahman, Abdellah Ait .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5943-5964
[48]  
Patel D, 2017, IEEE VTS VEH TECHNOL
[49]   Internet of Medical Things (IoMT): Overview, Emerging Technologies, and Case Studies [J].
Razdan, Sahshanu ;
Sharma, Sachin .
IETE TECHNICAL REVIEW, 2022, 39 (04) :775-788
[50]   A study of access control requirements for healthcare systems based on audit trails from access logs [J].
Rostad, Lillian ;
Edsberg, Ole .
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, :175-+