Open Access Open Access  Restricted Access Subscription Access

A Novel Distributed Token-Based Access Control Algorithm Using A Secret Sharing Scheme for Secure Data Access Control


Affiliations
1 Department of Computer Science, Government Arts College, Coimbatore, Tamil Nadu, India
 

Electronic health (e-Health) services present a proficient exchange of the patient's records among various entities; they contain physicians, receptionists, nurses, insurance businesses, and lab technologists. The data owner signifies content providers who could record and distribute health reports at the Medical History Database Server (MHDS) surroundings for distribution in e-Health. The MHDS model presents huge chances to sustain supple and prohibited data swap. However, access control provides the MHDS pretense with a severe challenge which hinders the broad acceptance of MHDS-based e-Health services. One major issue needs to be resolved to carry out protected data exchange: 1) how can these communications entities manage access? Many attempts have been made in the past to offer safe and trustworthy access control to e-Health services. However, due to a shortage of trust and the dynamic nature of e-Health services, the model would be vulnerable to many threats and attacks. This work proposed Distributed Token-based Access Control (DTAC) algorithm to deal with this problem. This algorithm allows patients and doctors to put their information on the MHDS and execute protected data swaps with a healthcare provider. The experimental results show that DTAC algorithms provide secure and flexible access control with less computation time and less network latency in the healthcare environment in heterogeneous networks.


Keywords

Heterogeneous Network Data Exchange Security Unauthorized Access Access Control Token Electronic Health
User
Notifications
Font Size

  • C. Sun, Q. Li, L. Cui, H. Li, Y. Shi, "Heterogeneous network-based chronic disease progression mining", 2019 IEEE Big Data Mining and Analytics, Volume 2, Issue 1, pp. 25 - 34, Oct 2018.
  • Wang, T., Kang, L., & Duan, J. (2021). Dynamic fine-grained access control scheme for vehicular ad hoc networks. Computer Networks, 188, 107872.
  • S.Y. Tan, "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things", 2018 IEEE Access, Volume 6, pp. 22464 - 22465, Apr 2018.
  • K. S. Gajghate, R.V. Mante, "Secure Document Sharing and Access Control on Cloud for Corporate User", 2018 IEEE Second International Conference on Inventive Communication and Computational Technologies, ISBN: 978-1-5386-1974-2, Apr 2018.
  • R. Vidhya, P. G. Rajan, T. A. Lawrance, "Elimination of Redundant Data in Cloud with Secured Access Control", 2017 IEEE International Conference on Technical Advancements in Computers and Communications, ISBN: 978-1-5090-4797-0, April 2017.
  • L. Liu, H. Wang, Y. Zhang, "Secure IoT Data Outsourcing With Aggregate Statistics and Fine-Grained Access Control", 2020 IEEE Access, Volume 8, pp. 95057 - 95067, Dec 2019.
  • Q. Zhang, S. Wang, Duo Zhang, "Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications", 2019 IEEE Access, Volume 7, pp. 137594 - 137607, Sep 2019.
  • Q. Huang, Y. Yang, L. Wang, "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things", 2017 IEEE Access, Volume 5, pp. 12941 - 12950, Jul 2017.
  • X. Ding, J. Yang, "An Access Control Model and Its Application in Blockchain", 2019 IEEE International Conference on Communications, Information System and Computer Engineering, ISBN: 978-1-7281-3681-3, July 2019.
  • Q. Xu, C. Tan, Z. Fan, W. Zhu, Y. Xiao, F. Cheng, "Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption", 2018 IEEE Access, Volume 6, pp. 34051 - 34074, Jun 2018.
  • Q. Li, Y. Tian, Y. Zhang, L. Shen, J. Guo, "Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing", 2019 IEEE Access, Volume 7, pp. 131534 - 131542, Sep 2019.
  • L. Tan, N. Shi, C. Yang, K. Yu, "A Blockchain-Based Access Control Framework for Cyber-Physical-Social System Big Data", 2020 IEEE Access, Volume 8, pp. 77215 - 77226, Apr 2020.
  • K. Riad, R. Hamza, H. Yan, "Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records", 2019 IEEE Access, Volume 7, pp. 86384 - 86393, Jul 2019.
  • C. Hu, W. Li, X. Cheng, J. Yu, "A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds", 2018 IEEE Transactions on Big Data, Volume 4, Issue 3, pp. 341 - 355, Sep 2018.
  • N. A. Fitri, M. U. H. A. Rasyid, A. Sudarsono, "Secure Attribute-Based Encryption with Access Control to Data Medical Records", 2018 International Electronics Symposium on Knowledge Creation and Intelligent Computing, ISBN: 978-1-5386-8079-7, Oct 2018.
  • S. Dixit, K. P. Joshi, S. G. Choi, "Multi Authority Access Control in a Cloud EHR System with MA-ABE", 2019 IEEE International Conference on Edge Computing, ISBN: 978-1-7281-2708-8, Jul 2019.
  • Zheng, T., Luo, Y., Zhou, T., & Cai, Z. (2022). Towards differential access control and privacy-preserving for secure media data sharing in the cloud. Computers & Security, 113, 102553.
  • Y. Yang, X. Liu, R. H. Deng, "Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things", 2018 IEEE Transactions on Industrial Informatics, Volume 14, Issue 8, pp. 3610 - 3617, Sep 2017.
  • K. Edemacu, B. Jang, J. W. Kim, "Efficient and Expressive Access Control With Revocation for Privacy of PHR Based on OBDD Access Structure", 2020 IEEE Access, Volume 8, pp. 18546 - 18557, Jan 2020.
  • S. Roy, A. K. Das, S. Chatterjee, "Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications", 2019 IEEE Transactions on Industrial Informatics, Volume 15, Issue 1, pp. 457 - 468, Apr 2018.
  • R. Xu, Y. Chen, E. Blasch, G. Chen, "BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT", 2018 computers journal, Volume 7, Issue 39, July 2018.
  • Vadlamudi, M. N., & Hussain, A. (2022). Design and implementation of energy-aware cross-layer routing protocol for wearable body area network. International Journal of Pervasive Computing and Communications.

Abstract Views: 286

PDF Views: 2




  • A Novel Distributed Token-Based Access Control Algorithm Using A Secret Sharing Scheme for Secure Data Access Control

Abstract Views: 286  |  PDF Views: 2

Authors

Jansi Rani Amalraj
Department of Computer Science, Government Arts College, Coimbatore, Tamil Nadu, India
Robert Lourdusamy
Department of Computer Science, Government Arts College, Coimbatore, Tamil Nadu, India

Abstract


Electronic health (e-Health) services present a proficient exchange of the patient's records among various entities; they contain physicians, receptionists, nurses, insurance businesses, and lab technologists. The data owner signifies content providers who could record and distribute health reports at the Medical History Database Server (MHDS) surroundings for distribution in e-Health. The MHDS model presents huge chances to sustain supple and prohibited data swap. However, access control provides the MHDS pretense with a severe challenge which hinders the broad acceptance of MHDS-based e-Health services. One major issue needs to be resolved to carry out protected data exchange: 1) how can these communications entities manage access? Many attempts have been made in the past to offer safe and trustworthy access control to e-Health services. However, due to a shortage of trust and the dynamic nature of e-Health services, the model would be vulnerable to many threats and attacks. This work proposed Distributed Token-based Access Control (DTAC) algorithm to deal with this problem. This algorithm allows patients and doctors to put their information on the MHDS and execute protected data swaps with a healthcare provider. The experimental results show that DTAC algorithms provide secure and flexible access control with less computation time and less network latency in the healthcare environment in heterogeneous networks.


Keywords


Heterogeneous Network Data Exchange Security Unauthorized Access Access Control Token Electronic Health

References





DOI: https://doi.org/10.22247/ijcna%2F2022%2F214501