Skip to main content

Advertisement

Log in

Trust based access control model for securing electronic healthcare system

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

An important issue in the Cloud-Based Electronic Healthcare System (CBEHS) is to protect the sensitive data and resources from the untrusted user. Enforcing the protection in the CBEHS, the access control model plays an important role. Access control is a security mechanism that checks every request of the data to identify the legitimate user. The access request will be granted or denied with the help of preconfigured access control policies. Although, in the previous years, many access control methods, techniques, and models have been proposed, but due to changing user’s behavior and security requirements in the CBEHS, the models suffer from several attacks and threats like Sybil attacks, collusion attack, insider attack, service hijacking, misuse of health data, and impersonation attack, etc. Due to this type of attack, the healthcare data and resources become more vulnerable. In this paper, we have proposed an access control model which is based on the trustworthiness of the requested user. This Trust-Based Access Control Model for Healthcare System (TBACMHS) framework composed of the trust mechanism, trust model, and access control policies which enhance the accuracy and efficiency of the system. This access control framework will ensure the only trusted and authorized user can access the data and resources. The detail design and presentation of the model show that the accuracy and efficiency of the CBEHS are more as compared to other trust models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Abdallah AE, Khayat EJ (2005) A formal model for parameterized role-based access control. In: Formal aspects in security and trust. Springer, Berlin, pp 233–246

  • Al-Janabi S, Al-Shourbaji I, Shojafar M, Shamshirband S (2017) Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt Inf J 18(2):113–122

    Article  Google Scholar 

  • Alam M, Emmanuel N, Khan T, Xiang Y, Hassan H (2018) Garbled role-based access control in the cloud. J Ambient Intell Human Comput 9(4):1153–1166

    Article  Google Scholar 

  • AlFarraj O, AlZubi A, Tolba A (2018) Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0885-1

    Article  Google Scholar 

  • Amiribesheli M, Bouchachia H (2017) A tailored smart home for dementia care. J Ambient Intell Humaniz Comput 9:1755–1782. https://doi.org/10.1007/s12652-017-0645-7

    Article  Google Scholar 

  • Ardagna CA, Cremonini M, di Vimercati SDC, Samarati P (2008) Privacy-enhanced location-based access control. Springer, Boston

  • Ardagna CA, Di Vimercati SDC, Foresti S, Grandison TW, Jajodia S, Samarati P (2010) Access control for smarter healthcare using policy spaces. Comput Secur 29(8):848–858

    Article  Google Scholar 

  • Balamurugan B, Venkata Krishna P (2015) Enhanced role-based access control for cloud security. In: Suresh LP, Dash SS, Panigrahi BK (eds) Artificial intelligence and evolutionary algorithms in engineering systems. Springer India, New Delhi, pp 837–852

    Chapter  Google Scholar 

  • Banyal R, Jain V, Jain P (2014) Dynamic trust based access control framework for securing multi-cloud environment. In: Proceedings of the 2014 international conference on information and communication technology for competitive strategies, ACM, p 29

  • Barometer ET (2018) Trust in healthcare. https://www.edelman.com/post/trust-in-healthcare-2018/. Accessed 27 Aug 2018

  • Behera PK, Khilar PM (2017) A novel trust based access control model for cloud environment. In: Proceedings of the international conference on signal, networks, computing, and systems. Springer, Berlin, pp 285–295

    Google Scholar 

  • Beuchelt G (2013) Chapter 8—Securing web applications, services, and servers. In: Vacca JR (ed) Computer and information security handbook (second edition), 2nd edn. Morgan Kaufmann, Boston, pp 143–163

    Chapter  Google Scholar 

  • Bhattasali T, Chaki R, Chaki N, Saeed K (2018) An adaptation of context and trust aware workflow oriented access control for remote healthcare. Int J Softw Eng Knowl Eng 28(06):781–810

    Article  Google Scholar 

  • Birkhäuer J, Gaab J, Kossowsky J, Hasler S, Krummenacher P, Werner C, Gerger H (2017) Trust in the health care professional and health outcome: a meta-analysis. PLoS ONE 12(2):e0170988

    Article  Google Scholar 

  • Bushehrian O, Nejad SE (2017) Health-care pervasive environments: a CLA based trust management. In: Galinina O, Andreev S, Balandin S, Koucheryavy Y (eds) Internet of things, smart spaces, and next generation networks and systems. Springer, Cham, pp 247–257

    Chapter  Google Scholar 

  • Buzzanca M, Carchiolo V, Longheu A, Malgeri M, Mangioni G (2017) Direct trust assignment using social reputation and aging. J Ambient Intell Humaniz Comput 8(2):167–175

    Article  Google Scholar 

  • Caballero-Gil C, Caballero-Gil P, Molina-Gil J, Martn-Fernndez F, Loia V (2017) Trust-based cooperative social system applied to a carpooling platform for smartphones. Sensors 17(2):245

    Article  Google Scholar 

  • Capitani di Vimercati S, Foresti S, Jajodia S, Samarati P (2007a) Access control policies and languages in open environments. Secure data management in decentralized systems. Springer, Berlin, pp 21–58

  • Capitani di Vimercati S, Foresti S, Samarati P (2007b) Authorization and access control. Security, privacy, and trust in modern data management. Springer, Berlin, pp 39–53

  • Chen J, Tian Z, Cui X, Yin L, Wang X (2018) Trust architecture and reputation evaluation for internet of things. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0887-z

    Article  Google Scholar 

  • Cho C, Baek M, Won Y (2018) Guaranteeing the integrity and reliability of distributed personal information access records. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-0871-7

    Article  Google Scholar 

  • Coppolino L, DAntonio S, Mazzeo G, Romano L (2017) Cloud security: emerging threats and current solutions. Comput Electr Eng 59:126–140

    Article  Google Scholar 

  • Darwish A, Hassanien AE, Elhoseny M, Sangaiah AK, Muhammad K (2017) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-017-0659-1

    Article  Google Scholar 

  • De Capitani Di Vimercati S, Foresti S, Samarati P, Jajodia S (2007) Access control policies and languages. Int J Comput Sci Eng 3(2):94–102

    Google Scholar 

  • Deshpande S, Ingle R (2018) Evidence based trust estimation model for cloud computing services. Int J Netw Secur 20(2):291–303

    Google Scholar 

  • Hosseinpour F, Siddiqui AS, Plosila J, Tenhunen H (2018) A security framework for fog networks based on role-based access control and trust models. In: Tjoa AM, Zheng L-R, Zou Z, Raffai M, Xu LD, Novak NM (eds) Research and practical issues of enterprise information systems. Springer, Cham, pp 168–180

    Chapter  Google Scholar 

  • Jiang L, Cheng Y, Yang L, Li J, Yan H, Wang X (2018) A trust-based collaborative filtering algorithm for e-commerce recommendation system. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-0928-7

    Article  Google Scholar 

  • Jiangcheng Q (2016) User behavior trust based cloud computing access control model. Department of Computer Science and Engineering, Blekinge Institute of Technology

    Google Scholar 

  • Kim S, Kim H (2016) A new metric of absolute percentage error for intermittent demand forecasts. Int J Forecast 32(3):669–679

    Article  Google Scholar 

  • Kiraz MS (2016) A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. J Ambient Intell Human Comput 7(5):731–760

    Article  Google Scholar 

  • Kuhn DR, Coyne EJ, Weil TR (2010) Adding attributes to role-based access control. Computer 43(6):79–81

    Article  Google Scholar 

  • Li X, Ma H, Zhou F, Gui X (2015) Service operator-aware trust scheme for resource matchmaking across multiple clouds. IEEE Trans Parallel Distrib Syst 26(5):1419–1429

    Article  Google Scholar 

  • Li X, Zhou F, Yang X (2011) A multi-dimensional trust evaluation model for large-scale p2p computing. J Parallel Distrib Comput 71(6):837–847

    Article  MATH  Google Scholar 

  • Lin G, Wang D, Bie Y, Lei M (2014) Mtbac: a mutual trust based access control model in cloud computing. China Commun 11(4):154–162

    Article  Google Scholar 

  • Liu X, Liu Q, Peng T, Wu J (2017) Dynamic access policy in cloud-based personal health record (phr) systems. Inf Sci 379:62–81

    Article  Google Scholar 

  • Malasinghe LP, Ramzan N, Dahal K (2017) Remote patient monitoring: a comprehensive study. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-017-0598-x

    Article  Google Scholar 

  • Manuel P (2015) A trust model of cloud computing based on quality of service. Ann Oper Res 233(1):281–292

    Article  Google Scholar 

  • Maw HA (2016) A trust-based adaptive access control model for wireless sensor networks. Ph.D. Dissertation, University of Hertfordshire

  • Narayanan HAJ, Güneş MH (2011) Ensuring access control in cloud provisioned healthcare systems. In: Consumer Communications and Networking Conference (CCNC), 2011 IEEE, pp 247–251

  • O’Hagan M (1988) Aggregating template or rule antecedents in real-time expert systems with fuzzy set logic. In: Twenty-Second Asilomar Conference on Signals, Systems and Computers, vol 2, pp 681–689

  • Ouaddah A, Mousannif H, Elkalam AA, Ouahman AA (2017) Access control in the internet of things: Big challenges and new opportunities. Comput Netw 112:237–262

    Article  Google Scholar 

  • Pussewalage HSG, Oleshchuk VA (2016) Privacy preserving mechanisms for enforcing security and privacy requirements in e-health solutions. Int J Inf Manage 36(6, Part B):1161–1173

    Article  Google Scholar 

  • Samarati P, Di Vimercati SDC (2001) Access control: policies, models, and mechanisms. Lect Notes Comput Sci 2171:137–196

    Article  MATH  Google Scholar 

  • Satsiou A, Tassiulas L (2010) Reputation-based resource allocation in p2p systems of rational users. IEEE Trans Parallel Distrib Syst 21(4):466–479

    Article  Google Scholar 

  • Senese SV (2015) A study of access control for electronic health records. All Student Theses. 55. http://opus.govst.edu/theses/55

  • Servos D, Osborn SL (2017) Current research and open problems in attribute-based access control. ACM Comput Surv (CSUR) 49(4):65

    Article  Google Scholar 

  • Sicuranza M, Esposito A, Ciampi M (2015) An access control model to minimize the data exchange in the information retrieval. J Ambient Intell Human Comput 6(6):741–752

    Article  Google Scholar 

  • Singh A, Chatterjee K (2017) A multi-dimensional trust and reputation calculation model for cloud computing environments. In: 2017 ISEA Asia Security and Privacy (ISEASP), pp 1–8

  • Tofallis C (2015) A better measure of relative prediction accuracy for model selection and model estimation. J Oper Res Soc 66(8):1352–1362

    Article  Google Scholar 

  • Wang W, Han J, Song M, Wang X (2011a) The design of a trust and role based access control model in cloud computing. In: 6th International conference on pervasive computing and applications (ICPCA), 2011, IEEE, pp 330–334

  • Wang W, Han J, Song M, Wang X (2011b) The design of a trust and role based access control model in cloud computing. In: 2011 6th International conference on pervasive computing and applications, pp 330–334

  • Willmott CJ, Matsuura K (2005) Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance. Clim Res 30(1):79–82

    Article  Google Scholar 

  • Yachana, Kaur N, Sood SK (2018) A trustworthy system for secure access to patient centric sensitive information. Telematics Inform 35(4):790–800

    Article  Google Scholar 

  • Yager RR (1988) On ordered weighted averaging aggregation operators in multicriteria decisionmaking. IEEE Trans Syst Man Cybern 18(1):183–190

    Article  MathSciNet  MATH  Google Scholar 

  • Yan Z, Li X, Wang M, Vasilakos AV (2017) Flexible data access control based on trust and reputation in cloud computing. IEEE Trans Cloud Comput 5(3):485–498

    Article  Google Scholar 

  • Yao C, Xu L, Huang X, Liu JK (2014) A secure remote data integrity checking cloud storage system from threshold encryption. J Ambient Intell Human Comput 5(6):857–865

    Article  Google Scholar 

  • Yarmand MH, Sartipi K, Down DG (2013) Behavior-based access control for distributed healthcare systems. J Comput Secur 21(1):1–39

    Article  Google Scholar 

  • Zeadally S, Isaac JT, Baig Z (2016) Security attacks and solutions in electronic health (e-health) systems. J Med Syst 40(12):263

    Article  Google Scholar 

  • Zhang R, Liu L (2010) Security models and requirements for healthcare application clouds. In: 2010 IEEE 3rd International conference on cloud computing, pp 268–275

  • Zhang R, Liu L, Xue R (2014) Role-based and time-bound access and management of ehr data. Secur Commun Netw 7(6):994–1015. https://doi.org/10.1002/sec.817

    Article  Google Scholar 

  • Zhao B, Xiao C, Zhang Y, Zhai P, Wang Z (2018) Assessment of recommendation trust for access control in open networks. Clust Comput:1–7

Download references

Acknowledgements

This publication is an outcome of the R&D work undertaken project under the Visvesvaraya PhD Scheme of Ministry of Electronics & Information Technology, Government of India, being implemented by Digital India Corporation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashish Singh.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, A., Chatterjee, K. Trust based access control model for securing electronic healthcare system. J Ambient Intell Human Comput 10, 4547–4565 (2019). https://doi.org/10.1007/s12652-018-1138-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-1138-z

Keywords

Navigation