Role-based and time-bound access and management of EHR data

被引:32
|
作者
Zhang, Rui [1 ]
Liu, Ling [2 ]
Xue, Rui [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
基金
中国国家自然科学基金; 美国国家科学基金会; 中国博士后科学基金;
关键词
EHR system; privacy preserving; role-based access control; time-bound key management; time tree; KEY ASSIGNMENT SCHEME; SECURITY;
D O I
10.1002/sec.817
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security and privacy are widely recognized as important requirements for access and management of electronic health record (EHR) data. In this paper, we argue that EHR data need to be managed with customizable access control in both spatial and temporal dimensions. We present a role-based and time-bound access control (RBTBAC) model that provides more flexibility in both roles (spatial capability) and time (temporal capability) dimensions to control the access of sensitive data. Through algorithmic combination of role-based access control and time-bound key management, our RBTBAC model has two salient features. First, we have developed a privacy-aware and dynamic key structure for role-based privacy aware access and management of EHR data, focusing on the consistency of access authorization (including data and time interval) with the activated role of user. In addition to role-based access, a path-invisible EHR structure is built for preserving privacy of patients. Second, we have employed a time tree method for generating time granule values, offering fine granularity of time-bound access authorization and control. Our initial experimental results show that tree-like time structure can improve the performance of the key management scheme significantly, and RBTBAC model is more suitable than existing solutions for EHR data management because it offers high-efficiency and better security and privacy. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:994 / 1015
页数:22
相关论文
共 50 条
  • [1] Blockchain and NFTs for Time-Bound Access and Monetization of Private Data
    Madine, Mohammad
    Salah, Khaled
    Jayaraman, Raja
    Battah, Ammar
    Hasan, Haya
    Yaqoob, Ibrar
    IEEE ACCESS, 2022, 10 : 94186 - 94202
  • [2] Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control
    Wu, Tsu-Yang
    Zhou, Chengxiang
    Chen, Chien-Ming
    Wang, Eric Ke
    Pan, Jeng-Shyang
    MULTIDISCIPLINARY SOCIAL NETWORKS RESEARCH, MISNC 2014, 2014, 473 : 437 - 444
  • [3] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
  • [4] Concurrency and Time in Role-Based Access Control
    Chiang, Chia-Chu
    Bayrak, Coskun
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 37 - 42
  • [5] Towards time-bound hierarchical key assignment for secure data access control
    Wu, Tsu-Yang (wutsuyang@gmail.com), 1600, Springer Verlag (473):
  • [6] An Efficient Time-bound Access Control Scheme for Dynamic Access Hierarchy
    Sui, Yan
    Maino, Fabio
    Guo, Yudong
    Wang, Kai
    Zou, Xukai
    2009 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS, 2009, : 279 - +
  • [7] A role-based access authorization to clinical and image data
    Motta, GH
    Furuie, SS
    Nardon, FB
    Gutierrez, MA
    RADIOLOGY, 2001, 221 : 761 - 762
  • [8] A role-based access authorization to clinical and image data
    Motta, GH
    Furuie, SS
    Nardon, FB
    Gutierrez, MA
    RADIOLOGY, 2001, 221 : 156 - 156
  • [9] Hierarchical access control with time-bound constraints based upon Chinese remainder theorem
    Department of Applied Mathematics, National Chiayi University, No.300 Syuefu Rd., Chiayi City 60004, Taiwan
    WSEAS Trans. Inf. Sci. Appl., 2007, 6 (1251-1256): : 1251 - 1256
  • [10] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200