Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud

被引:10
作者
Kanwal, Tehsin [1 ]
Jabbar, Ather Abdul [1 ]
Anjum, Adeel [1 ]
Malik, Saif U. R. [1 ,2 ]
Khan, Abid [1 ]
Ahmad, Naveed [1 ]
Manzoor, Umar [3 ]
Shahzad, Muhammad Naeem [4 ]
Balubaid, Muhammad A. [5 ]
机构
[1] Comsats Inst Informat Technol, Dept Comp Sci, Pk Rd Chak Shahzad, Islamabad 45550, Pakistan
[2] Cybernetica AS, Tallinn, Estonia
[3] Univ Hull, Dept Comp Sci & Technol, Kingston Upon Hull, N Humberside, England
[4] Comsats Univ Islamabad, Dept Elect Engn, Lahore, Pakistan
[5] King Abdulaziz Univ, Dept Ind Engn, Fac Engn, Riyadh, Saudi Arabia
关键词
Electronic health records; hybrid cloud; privacy; relationship; access control; cryptography; SECURITY; MANAGEMENT;
D O I
10.1177/1550147719846050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
State-of-the-art progress in cloud computing encouraged the healthcare organizations to outsource the management of electronic health records to cloud service providers using hybrid cloud. A hybrid cloud is an infrastructure consisting of a private cloud (managed by the organization) and a public cloud (managed by the cloud service provider). The use of hybrid cloud enables electronic health records to be exchanged between medical institutions and supports multipurpose usage of electronic health records. Along with the benefits, cloud-based electronic health records also raise the problems of security and privacy specifically in terms of electronic health records access. A comprehensive and exploratory analysis of privacy-preserving solutions revealed that most current systems do not support fine-grained access control or consider additional factors such as privacy preservation and relationship semantics. In this article, we investigated the need of a privacy-aware fine-grained access control model for the hybrid cloud. We propose a privacy-aware relationship semantics-based XACML access control model that performs hybrid relationship and attribute-based access control using extensible access control markup language. The proposed approach supports fine-grained relation-based access control with state-of-the-art privacy mechanism named Anatomy for enhanced multipurpose electronic health records usage. The proposed (privacy-aware relationship semantics-based XACML access control model) model provides and maintains an efficient privacy versus utility trade-off. We formally verify the proposed model (privacy-aware relationship semantics-based XACML access control model) and implemented to check its effectiveness in terms of privacy-aware electronic health records access and multipurpose utilization. Experimental results show that in the proposed (privacy-aware relationship semantics-based XACML access control model) model, access policies based on relationships and electronic health records anonymization can perform well in terms of access policy response time and space storage.
引用
收藏
页数:24
相关论文
共 78 条
[1]   A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds [J].
Abbas, Assad ;
Khan, Samee U. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) :1431-1441
[2]  
Abbas MS, 2015, ITAL J PURE APPL MAT, P389
[3]   DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party [J].
Ali, Mazhar ;
Malik, Saif U. R. ;
Khan, Samee U. .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (04) :642-655
[4]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[5]  
Alshehrsi S, 2012, 2012 IEEE 28 INT C D
[6]  
Alshehrsi S, 2012, P DAT MAN CLOUD WORK
[7]  
[Anonymous], 2013, EXTENSIBLE ACC CONTR
[8]  
[Anonymous], 2014, THESIS
[9]   A Cloud-based Approach for Interoperable Electronic Health Records (EHRs) [J].
Bahga, Arshdeep ;
Madisetti, Vijay K. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2013, 17 (05) :894-906
[10]   ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing [J].
Barua M. ;
Liang X. ;
Lu R. ;
Shen X. .
International Journal of Security and Networks, 2011, 6 (2-3) :67-76