A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data

被引:0
|
作者
Prosanta Gope
Ruhul Amin
机构
[1] Singapore University of Technology and Design,iTrust, Centre for Research in Cyber Security
[2] Thapar university,Department of Computer Science & Engineering
来源
Journal of Medical Systems | 2016年 / 40卷
关键词
EPHR; Access control; Break-the-glass; RBAC; Mac;
D O I
暂无
中图分类号
学科分类号
摘要
Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.
引用
收藏
相关论文
共 50 条
  • [31] Research on the Access Control and Communications Security Research Based on Hadoop Big Data Processing
    Hu, Yanhua
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 270 - 273
  • [32] A Novel Trust Based Access Control Model for Cloud Environment
    Behera, Pratap Kumar
    Khilar, Pabitra Mohan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 1, 2017, 395 : 285 - 295
  • [33] Access central and system audit based on "patient-doctor relation and clinical situation" model
    Hirose, Y
    MEDINFO '98 - 9TH WORLD CONGRESS ON MEDICAL INFORMATICS, PTS 1 AND 2, 1998, 52 : 1151 - 1155
  • [34] A novel two phase data sensitivity based access control framework for healthcare data
    Sayantani Saha
    Chandreyee Chowdhury
    Sarmistha Neogy
    Multimedia Tools and Applications, 2024, 83 : 8867 - 8892
  • [35] An improved reference flow control model for policy-based intrusion detection
    Zimmermann, J
    Mé, L
    Bidan, C
    COMPUTER SECURITY - ESORICS 2003, PROCEEDINGS, 2003, 2808 : 291 - 308
  • [36] A model checking-based approach for security policy verification of mobile systems
    Braghin, Chiara
    Sharygina, Natasha
    Barone-Adesi, Katerina
    FORMAL ASPECTS OF COMPUTING, 2011, 23 (05) : 627 - 648
  • [37] A novel two phase data sensitivity based access control framework for healthcare data
    Saha, Sayantani
    Chowdhury, Chandreyee
    Neogy, Sarmistha
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (03) : 8867 - 8892
  • [38] Differential and Access Policy Based Privacy-Preserving Model in Cloud Environment
    Gupta, Rishabh
    Singh, Ashutosh Kumar
    JOURNAL OF WEB ENGINEERING, 2022, 21 (03): : 609 - 632
  • [39] Application of an Improved Role-Based Access Control Model in OBS Security Mechanism
    Jiang, Xueying
    Zhang, Chengjun
    Liu, Kean
    Li, Shiyao
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 555 - 558
  • [40] Multi-attribute-Based Access Control Policy for Supply Chain Data Service
    Zou Junwei
    Lan Jiewei
    Wang Xiaoke
    Luo Hong
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (06) : 1283 - 1290