Maintaining security and privacy of the Patient's EHR using cryptographic organization based access control h cloud environment

Author(s):  
Afnan Salem Babrahem ◽  
Muhammad Mostafa Monowar
2018 ◽  
Vol 30 (4) ◽  
pp. 14-31 ◽  
Author(s):  
Suyel Namasudra ◽  
Pinki Roy

This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access control has emerged as a challenging issue of cloud computing. Access control method allows data accessing of an authorized user. Existing access control schemes mainly focus on the confidentiality of the data storage. In this article, a novel access control scheme has been proposed for efficient data accessing. The proposed scheme allows reducing the searching cost and accessing time, while providing the data to the user. It also maintains the security of the user's confidential data.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Zhiru Li ◽  
Wei Xu ◽  
Huibin Shi ◽  
Yuanyuan Zhang ◽  
Yan Yan

Considering the importance of energy in our lives and its impact on other critical infrastructures, this paper starts from the whole life cycle of big data and divides the security and privacy risk factors of energy big data into five stages: data collection, data transmission, data storage, data use, and data destruction. Integrating into the consideration of cloud environment, this paper fully analyzes the risk factors of each stage and establishes a risk assessment index system for the security and privacy of energy big data. According to the different degrees of risk impact, AHP method is used to give indexes weights, genetic algorithm is used to optimize the initial weights and thresholds of BP neural network, and then the optimized weights and thresholds are given to BP neural network, and the evaluation samples in the database are used to train it. Then, the trained model is used to evaluate a case to verify the applicability of the model.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


2014 ◽  
pp. 451-484
Author(s):  
Rula Sayaf ◽  
Dave Clarke

Access control is one of the crucial aspects in information systems security. Authorizing access to resources is a fundamental process to limit potential privacy violations and protect users. The nature of personal data in online social networks (OSNs) requires a high-level of security and privacy protection. Recently, OSN-specific access control models (ACMs) have been proposed to address the particular structure, functionality and the underlying privacy issues of OSNs. In this survey chapter, the essential aspects of access control and review the fundamental classical ACMs are introduced. The specific OSNs features and review the main categories of OSN-specific ACMs are highlighted. Within each category, the most prominent ACMs and their underlying mechanisms that contribute enhancing privacy of OSNs are surveyed. Toward the end, more advanced issues of access control in OSNs are discussed. Throughout the discussion, different models and highlight open problems are contrasted. Based on these problems, the chapter is concluded by proposing requirements for future ACMs.


Author(s):  
Chandu Thota ◽  
Revathi Sundarasekar ◽  
Gunasekaran Manogaran ◽  
Varatharajan R ◽  
Priyan M. K.

This chapter proposes an efficient centralized secure architecture for end to end integration of IoT based healthcare system deployed in Cloud environment. The proposed platform uses Fog Computing environment to run the framework. In this chapter, health data is collected from sensors and collected sensor data are securely sent to the near edge devices. Finally, devices transfer the data to the cloud for seamless access by healthcare professionals. Security and privacy for patients' medical data are crucial for the acceptance and ubiquitous use of IoT in healthcare. The main focus of this work is to secure Authentication and Authorization of all the devices, Identifying and Tracking the devices deployed in the system, Locating and tracking of mobile devices, new things deployment and connection to existing system, Communication among the devices and data transfer between remote healthcare systems. The proposed system uses asynchronous communication between the applications and data servers deployed in the cloud environment.


Author(s):  
Zhixiong Zhang ◽  
Xinwen Zhang ◽  
Ravi Sandhu

This chapter addresses the problem that traditional role-base access control (RBAC) models do not scale up well for modeling security policies spanning multiple organizations. After reviewing recently proposed Role and Organization Based Access Control (ROBAC) models, an administrative ROBAC model called AROBAC07 is presented and formalized in this chapter. Two examples are used to motivate and demonstrate the usefulness of ROBAC. Comparison between AROBAC07 and other administrative RBAC models are given. We show that ROBAC/AROBAC07 can significantly reduce administration complexity for applications involving a large number of organizational units. Finally, an application compartment-based delegation model is introduced, which provides a method to construct administrative role hierarchy in AROBAC07. We show that the AROBAC07 model provides convenient ways to decentralize administrative tasks for ROBAC systems and scales up well for role-based systems involving a large number of organizational units.


Author(s):  
Kimaya Arun Ambekar ◽  
Kamatchi R.

Cloud computing is based on years of research on various computing paradigms. It provides elasticity, which is useful in the situations of uneven ICT resources demands. As the world is moving towards digitalization, the education sector is expected to meet the pace. Acquiring and maintaining the ICT resources also necessitates a huge amount of cost. Education sector as a community can use cloud services on various levels. Though the cloud is very successfully running technology, it also shows some flaws in the area of security, privacy and trust. The research demonstrates a model in which major security areas are covered like authorization, authentication, identity management, access control, privacy, data encryption, and network security. The total idea revolves around the community cloud as university at the center and other associated colleges accessing the resources. This study uses OpenStack environment to create a complete cloud environment. The validation of the model is performed using some cases and some tools.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1207 ◽  
Author(s):  
Lei Hang ◽  
Do-Hyeun Kim

With the gradual popularization of Internet-of-Things (IoT) applications and the development of wireless networking technologies, the use of heterogeneous devices and runtime verification of task fulfillment with different constraints are required in real-world IoT scenarios. As far as IoT systems are concerned, most of them are built on centralized architectures, which reveal various assailable points in data security and privacy threats. Hence, this paper aims to investigate these issues by delegating the responsibility of a verification monitor from a centralized architecture to a decentralized manner using blockchain technology. We present a smart contract-based task management scheme to provide runtime verification of device behaviors and allows trustworthy access control to these devices. The business logic of the proposed system is specified by the smart contract, which automates all time-consuming processes cryptographically and correctly. The usability of the proposed solution is further demonstrated by implementing a prototype application in which the Hyperledger Fabric is utilized to implement the business logic for runtime verification and access control with one desktop and one Raspberry Pi. A comprehensive evaluation experiment is conducted, and the results indicate the effectiveness and efficiency of the proposed system.


Sign in / Sign up

Export Citation Format

Share Document