A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data

被引:0
|
作者
Prosanta Gope
Ruhul Amin
机构
[1] Singapore University of Technology and Design,iTrust, Centre for Research in Cyber Security
[2] Thapar university,Department of Computer Science & Engineering
来源
Journal of Medical Systems | 2016年 / 40卷
关键词
EPHR; Access control; Break-the-glass; RBAC; Mac;
D O I
暂无
中图分类号
学科分类号
摘要
Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.
引用
收藏
相关论文
共 50 条
  • [21] BC-BLPM: A Multi-Level Security Access Control Model Based on Blockchain Technology
    Yu, Xiang
    Shu, Zhangxiang
    Li, Qiang
    Huang, Jun
    CHINA COMMUNICATIONS, 2021, 18 (02) : 110 - 135
  • [22] A Semantic-Based Access Control for Ensuring Data Security in Cloud Computing
    Auxilia, M.
    Raja, K.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 171 - 175
  • [23] An access control model for data security sharing cross-domain in consortium blockchain
    Liu Y.
    Yang W.
    Wang Y.
    IET Blockchain, 2023, 3 (01): : 18 - 34
  • [24] Policy-based access control model for mobile agent system
    Chen Xiao-su
    Lin Zhi
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1222 - 1225
  • [25] Access Control Policy Model for Implementing Network Based Authorization Framework
    Singh, Manpreet
    Patterh, Manjeet S.
    CSA 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 42 - 47
  • [26] Blockchain-Based Access Control Model for Security Attributes in the Internet of Things
    Yan, Xincheng
    Wu, Jianhua
    Zhou, Na
    Jiang, Zhihong
    Wu, Juqin
    Yin, Jianhui
    Liu, Ying
    2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS, 2024, : 95 - 101
  • [27] A Policy-hidden Big Data Access Control Method Based on Blockchain
    Lin L.
    Chu Z.-X.
    Liu Z.-M.
    Guo F.-B.
    Xie X.-Y.
    Zhang J.-B.
    Zidonghua Xuebao/Acta Automatica Sinica, 2023, 49 (05): : 1031 - 1049
  • [28] Internet security: A novel role/object-based access control for digital libraries
    Chen, Su-Shing
    Choo, Chee-Yoong
    Chow, Randy Y.
    JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2006, 16 (02) : 87 - 103
  • [29] Big data security access control algorithm based on memory index acceleration in WSNs
    Peng, Jianhua
    Zhou, Hui
    Meng, Qingjie
    Yang, Jingli
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [30] Big data security access control algorithm based on memory index acceleration in WSNs
    Jianhua Peng
    Hui Zhou
    Qingjie Meng
    Jingli Yang
    EURASIP Journal on Wireless Communications and Networking, 2020