Role-based and time-bound access and management of EHR data

被引:32
作者
Zhang, Rui [1 ]
Liu, Ling [2 ]
Xue, Rui [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
基金
美国国家科学基金会; 中国博士后科学基金; 中国国家自然科学基金;
关键词
EHR system; privacy preserving; role-based access control; time-bound key management; time tree; KEY ASSIGNMENT SCHEME; SECURITY;
D O I
10.1002/sec.817
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security and privacy are widely recognized as important requirements for access and management of electronic health record (EHR) data. In this paper, we argue that EHR data need to be managed with customizable access control in both spatial and temporal dimensions. We present a role-based and time-bound access control (RBTBAC) model that provides more flexibility in both roles (spatial capability) and time (temporal capability) dimensions to control the access of sensitive data. Through algorithmic combination of role-based access control and time-bound key management, our RBTBAC model has two salient features. First, we have developed a privacy-aware and dynamic key structure for role-based privacy aware access and management of EHR data, focusing on the consistency of access authorization (including data and time interval) with the activated role of user. In addition to role-based access, a path-invisible EHR structure is built for preserving privacy of patients. Second, we have employed a time tree method for generating time granule values, offering fine granularity of time-bound access authorization and control. Our initial experimental results show that tree-like time structure can improve the performance of the key management scheme significantly, and RBTBAC model is more suitable than existing solutions for EHR data management because it offers high-efficiency and better security and privacy. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:994 / 1015
页数:22
相关论文
共 39 条
  • [1] CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
    AKL, SG
    TAYLOR, PD
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03): : 239 - 248
  • [2] [Anonymous], P 14 ACM INT C INF K
  • [3] [Anonymous], 2009, PATIENT CENTRIC ATTR
  • [4] [Anonymous], 2005, eXtensible Access Control Markup Language (XACML)
  • [5] Ateniese G, 2006, CCS 06, V176, P1684
  • [6] Cassandra: Flexible trust management, applied to electronic health records
    Becker, MY
    Sewell, P
    [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 139 - 154
  • [7] An efficient time-bound hierarchical key management scheme for secure broadcasting
    Bertino, Elisa
    Shang, Ning
    Wagstaff, Samuel S., Jr.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (02) : 65 - 70
  • [8] Policy based electronic transmission of prescriptions
    Chadwick, DW
    Mundy, D
    [J]. IEEE 4TH INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 197 - 206
  • [9] Enforcing the security of a time-bound hierarchical key assignment scheme
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    [J]. INFORMATION SCIENCES, 2006, 176 (12) : 1684 - 1694
  • [10] De Santis A, 2007, SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P133