HECC based Patient Privacy Preserving Access Control Model

被引:0
|
作者
Prasanalakshmi, B. [1 ]
Pugalendhi, Ganesh Kumar [2 ]
机构
[1] King Khalid Univ, Abha, Saudi Arabia
[2] Anna Univ, Madras, Tamil Nadu, India
关键词
Hyper Elliptic curve cryptography; Electronic health record; Access control model; Situation based access control model; Patient centric privacy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An Electronic patient medical record monitoring system has been actively developed and implemented in many countries with their own principles on implementation. Even though the history of implementation goes back to years, it is true that it has not yet completed its development stage. Still the system lags with some drawbacks and limitations. This paper discusses and describes the implementation of an Access control model that purely concentrates on the privacy preserving aspects of the patients with access control policies described. The Access control model proposed takes into concern the situation-based model also. This situation-based model takes into concern the authorization of the relatives or the family physician when a situation arises for the patient to authenticate the emergency doctor to retrieve his medical records. Also, a biometric authentication of the patient or the authorizing (relatives or the family physician) person is proposed to be unique and fast enough so that the data is retrieved only on the authorization of the concerned person. This system proves a highest level of privacy in concern with the medical records of a patient. Also, the Hyper Elliptic curve cryptography enhances the security level in authentication.
引用
收藏
页码:50 / 53
页数:4
相关论文
共 50 条
  • [41] Cloud Computing: Preserving Data Privacy and Managing Access Control
    Giweli, Nabil
    Shahrestani, Seyed
    Cheung, Hon
    INNOVATION VISION 2020: SUSTAINABLE GROWTH, ENTREPRENEURSHIP, AND ECONOMIC DEVELOPMENT, VOLS 1-4, 2012, : 1742 - 1748
  • [42] Towards Distributed Privacy-Preserving Mobile Access Control
    Wang, Zhijie
    Huang, Dijiang
    Wu, Huijun
    Li, Bing
    Deng, Yuli
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 582 - 587
  • [43] Privacy-Preserving Distributed Data Access Control for CloudIoT
    Nasiraee, Hassan
    Ashouri-Talouki, Maede
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2476 - 2487
  • [44] To pass or not to pass: Privacy-preserving physical access control
    Garcia-Rodriguez, Jesus
    Krenn, Stephan
    Slamanig, Daniel
    COMPUTERS & SECURITY, 2024, 136
  • [45] Privacy preserving access control policy and algorithms for conflicting problems
    Sun, Lili
    Wang, Hua
    Tao, Xiaohui
    Zhang, Yanchun
    Yang, Jing
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 250 - 257
  • [46] A survey of privacy-preserving access control in cloud computing
    Li, Hongjiao, 1600, Binary Information Press (10):
  • [47] ACCESS CONTROL FOR PRIVACY-PRESERVING GAUSSIAN PROCESS REGRESSION
    Nakachi, Takayuki
    Wang, Yitu
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 4158 - 4162
  • [48] Distributed Privacy-Preserving Access Control in Sensor Networks
    Zhang, Rui
    Zhang, Yanchao
    Ren, Kui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (08) : 1427 - 1438
  • [49] Privacy-Preserving Data Processing with Flexible Access Control
    Ding, Wenxiu
    Yan, Zheng
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) : 363 - 376
  • [50] Dynamic permission access control model based on privacy protection
    Qikun Zhang
    Liang Zhu
    Kunyuan Zhao
    Yimeng Wu
    Baohua Jin
    Jianyong Li
    Yinghui Meng
    Sikang Hu
    Telecommunication Systems, 2022, 81 : 191 - 205