An Enhanced Role-Based Access Control Mechanism for Hospital Information Systems

Author(s):  
Chen-Guang He ◽  
Cun-Zhang Cao ◽  
Shu-Di Bao
Author(s):  
M Meneka ◽  
K. Meenakshisundaram

To be able to leverage big data to achieve enhanced strategic insight and make informed decision, an efficient access control mechanism is needed for ensuring end to end security of such information asset. Attribute Based Access Control (ABAC), Role Based Access Control (RBAC) and Event Based Access Control (EBAC) are widely used access control mechanisms. The ABAC system is much more complex in terms of policy reviews, hence analyzing the policy and reviewing or changing user permission are quite complex task. RBAC system is labor intensive and time consuming to build a model instance and it lacks flexibility to efficiently adapt to changing user’s, objects and security policies. EBAC model considered only the events to allocate access controls. Yet these mechanisms have limitations and offer feature complimentary to each other. So in this paper, Event-Role-Attribute based fine grained Access Control mechanism is proposed, it provide a flexible boundary which effectively adapt to changing user’s, objects and security policies based on the event. The flexible boundary is achieved by using temporal and environment state of an event. It improves the big data security and overcomes the disadvantages of the ABAC and RBAC mechanisms. The experiments are conducted to prove the effectiveness of the proposed Event-Role-Attribute based Access Control mechanism over ABAC and RBAC in terms of computational overhead.


10.28945/3374 ◽  
2009 ◽  
Author(s):  
Adesina Sodiya ◽  
Adebukola Onashoga

Ensuring adequate security of information has been a growing concern of individuals and organizations. There is then the need to provide suitable access control mechanism for preventing insider abuses and ensuring appropriate use of resources. This paper presents an access control scheme that adopts the techniques of Role-Based Access Control (RBAC), Purpose-Based Access Control (PBAC), Time-Based Access Control (TBAC) and History-Based Access Control (HBAC) as components to form an integrated Components-based Access Control Architecture (CACA). In CACA, an Access Control Score (ACS) is computed from the combined access control techniques. CACA also combines ACS with the sensitivity nature of system resources before a level of access is granted. The architecture was implemented within a payroll system developed using JAVA and SQL. Using usability testing, the evaluation of CACA showed 92% reduction in insider abuses and misuse of privileges. This shows that CACA can provide higher level of security access as against what used to exist.


2020 ◽  
Vol 8 (5) ◽  
pp. 2390-2396

With the increased development of cloud computing, access control is of paramount importance as a security concern. Numerous access control approaches exist in various published works. Among such prevalent approaches, Role Based Access Control (RBAC) model for enterprise cloud is scope of the present study. Nowadays, resource management, along with the primary aspect of security concern, is also addressed by the access control policies through restricting the allocation of the computing resources based on the roles assigned to the users. Keeping in view of the upcoming peak-load requirements or certain constraints, the policies may have ineffective resource allocation which leads to over/under-utilization of the resources over a period of time. So, an adaptive access control mechanism is desired that can vary their policies dynamically for resource allocation depending upon the ongoing requirements, for its efficient utilization. This is presented in the form of an adaptive access control mechanism (AACM) that aims to effectively utilize the computing resources in the enterprise cloud. It will aid in identifying the over- and under-allocation of the computing resources defined as access control policies and redefine these policies so as to ensure efficient and effective usage of the enterprise cloud resources. In this paper, this novel approach to access control mechanism for the enterprise cloud is represented using ontologies developed in Protégé. This is developed by identification of the underlying concepts and their interrelationships through properties, in the enterprise cloud. The presented ontology is for the sake of knowledge representation to represent knowledge and facts.


Sign in / Sign up

Export Citation Format

Share Document