Evolution of access control models for protection of patient details: a survey
-
2018-03-19 https://doi.org/10.14419/ijet.v7i2.8.10520 -
Access Control Models, DAC, Hospital Information System, MAC, KC-RBAC, RBAC, Patient Privacy -
Abstract
Hospitals across the world are adapting to Electronic Hospital Information Systems and are moving away from the manual paper systems to provide patients efficient services. Numerous Access ControlModels have been deployed for securing patient privacy one of them being Role Based Access Control Model (RBAC). The current models merely allow access on the basis of roles and role hierarchy without actually understanding the real intention of the person accessing the system. This could lead to a compromise of patient privacy and thus new methods have been evolving. In this survey we will see an evolution of the access control models which lead to the discovery of KC-RBAC (Knowledge Constrained Role Based Access Control) Model which takes into consideration the knowledge related to the medical domain along with the role to provide authorization.
-
References
[1] Ebrahim Sahafizadeh, Saeed Parsa “Survey on Access Control Modelsâ€Volume 1 IEEE 2010
[2] Chen-GuangHe ,Cun-Zhang Cao and Shu-Di Bao “An Enhanced Role-Based Access Control Mechanism for Hospital Information Systems†IEEE Jan 2012
[3] Ruchika Asija and RajarathnamNallusamy “A survey on Security and Privacy of Healthcare Data†2011.
[4] J. Li, "Ensuring privacy in a personal health record system," Computer, vol. 48, pp. 24-31, 2015.
[5] M. Fahim Ferdous Khan, Ken Sakamura “Towards a synergy among Discretionay, Role Based and Context Aware Access Control Model in Healthcare Information Technology†IEEE June 2012.
[6] Dipmala Salunke, Anilkumar Upadhyay, Amol Sarwade,VaibhavMarde, Sachin Kandekar “A Survey Paper on Role Based Access Control†International Journal Of Advanced Research in Computer and Communication engineering Vol 2, Issue 3, March 2013.
[7] Min-A Jeong’, Jung-Ja Kim’, and YonggwanWon“A Flexible Database Security System using Multiple Access Control Models†IEEE October 2003
[8] Lawrence Kerr, Jim Alves-Foss “Combining Mandatory and Attribute based Access Control†IEEE March 2016
[9] Deborah D. Downs, Jerzy R. Rub, Kenneth C. Kung, Carole S, Jordan “Issues In Discretionary Access Control†IEEE 2014
[10] R. Zhang, D. Chen, and X. Shang, "Privacy preserving for patients’ information: a knowledge-constrained access control model for hospital information systems," In Proc. IEEE INDIN 2016, Poitiers, France, 2016, pp. 921-926.
[11] R. S. Sandhu, E. J. Coyne, H. L. Feinstein and C. E. Youman, "Rolebased access control models," IEEE Computer, vol. 29, pp. 38-47, 1996.
[12] Barsha Mitra ,Shamik Sural, Jaideep Vaidya , Vijayalakshmi Atluri “Migrating from RBAC to Temporal RBAC†IEEE Aug 2017
[13] Runtong Zhang, Senior Member, IEEE, Donghua Chen, Xiaopu Shang, Member, IEEE, Xiaomin Zhu, and Kecheng Liu “A Knowledge-Constrained Access Control Model for Protecting Patient Privacy in Hospital Information Systems†IEEE 2017.
[14] Lindi A. Slevin, Alex Macfie “ROLE BASED ACCESS CONTROL FOR A MEDICAL DATABASE†ACM Digital Library 2007
[15] Bokefode Jayant, UbaleSwapnaja, Modani Dattatray, ApteSulabha S. “Analysis of DAC MAC RBAC Access Control based Models for Security†International Journal of Computer Applications (0975 – 8887) Volume 104 – No.5, October 2014
[16] T. Padmapriya, V.Saminadan, “Performance Improvement in long term Evolution-advanced network using multiple imput multiple output techniqueâ€, Journal of Advanced Research in Dynamical and Control Systems, Vol. 9, Sp-6, pp: 990-1010, 2017.
[17] S.V.Manikanthan and K.Baskaran “Low Cost VLSI Design Implementation of Sorting Network for ACSFD in Wireless Sensor Networkâ€, CiiT International Journal of Programmable Device Circuits and Systems,Print: ISSN 0974 – 973X & Online: ISSN 0974 – 9624, Issue : November 2011, PDCS112011008.
-
Downloads
-
How to Cite
Sinha, G., Shankar K.C, P., & Jain, S. (2018). Evolution of access control models for protection of patient details: a survey. International Journal of Engineering & Technology, 7(2.8), 554-558. https://doi.org/10.14419/ijet.v7i2.8.10520Received date: 2018-03-23
Accepted date: 2018-03-23
Published date: 2018-03-19