Role-Attribute-Based Encryption (RABE) Access Control for Healthcare Cloud Systems
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 8
Abstract
In the medical industry, it is critical to ensure the confidentiality of patients’ personal health records when storing and managing them. Before cloud computing surfaced, heath providers used local servers and hard drives to store their records and data. As cloud computing has been becoming more prominent many healthcare providers are using the cloud to store and manage their sensitive data. This journal compares and investigates two different access control models, in particular Role-Based Access Control and Attribute-Based Access Control, to validate the confidentiality of data when storing and managing personal health records on cloud services. The comparative analysis of these access control models is done to identify possible inefficiency and privacy restrictions in these two access control based models. In addition, in this journal we propose a new access control model, which we refer to as Role-Attribute-Based-Encryption Access Control (RABE), by combining some of the best aspects of both RBAC and ABAC in order to improve data privacy on cloud systems used in healthcare.
Authors and Affiliations
Paolina Centonze
Web Personalization With Web Usage Mining Technics and Association Rules
As amount of information and web development increase considerably, some technics and methods are required to allow efficient access to data and information extraction from them. Extracting useful pattern from worldwide...
NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks...
Motif Discovery and Data Mining in Bioinformatics
Bioinformatics analyses huge amounts of biological data that demands in-depth understanding. On the other hand, data mining research develops methods for discovering motifs in biosequences. Motif discovery involves benef...
A New Method on Data Clustering Based on Hybrid K-Harmonic Means and Imperialist Competitive Algorithm
Data clustering is one of the commonest data mining techniques. The K-means algorithm is one of the most wellknown clustering algorithms thatare increasingly popular due to the simplicity of implementation and speed of o...
A Survey of Wireless Sensor Network Routing Protocols based on SPIN
SPIN(Sensor Protocols for Information via Negotiation) comprises of a set of adaptive protocols that proficiently disseminate data in wireless sensor network(WSN).SPIN overcomes certain deficiencies associated with some...