Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems
Title | Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Rezaeibagha, F., Mu, Y. |
Conference Name | 2017 IEEE Trustcom/BigDataSE/ICESS |
Date Published | aug |
ISBN Number | 978-1-5090-4906-6 |
Keywords | Access Control, access control policy combination, authorisation, Collaboration, computer network, cryptography, data privacy, Data security, distributed processing, Distributed Systems, electronic health record, electronic health records, electronic healthcare systems, Health Care, hospitals, large scale healthcare system, patients privacy, policy-based governance, privacy, pubcrawl, secure integrated systems, secure privacy-preserved EHR systems, security, Security Policies Analysis, similarity analysis, XACML, XACML policies |
Abstract | In distributed systems, there is often a need to combine the heterogeneous access control policies to offer more comprehensive services to users in the local or national level. A large scale healthcare system is usually distributed in a computer network and might require sophisticated access control policies to protect the system. Therefore, the need for integrating the electronic healthcare systems might be important to provide a comprehensive care for patients while preserving patients' privacy and data security. However, there are major impediments in healthcare systems concerning not well-defined and flexible access control policy implementations, hindering the progress towards secure integrated systems. In this paper, we introduce an access control policy combination framework for EHR systems that preserves patients' privacy and ensures data security. We achieve our goal through an access control mechanism which handles multiple access control policies through a similarity analysis phase. In that phase, we evaluate different XACML policies to decide whether or not a policy combination is applicable. We have provided a case study to show the applicability of our proposed approach based on XACML. Our study results can be applied to the electronic health record (EHR) access control policy, which fosters interoperability and scalability among healthcare providers while preserving patients' privacy and data security. |
URL | https://ieeexplore.ieee.org/document/8029465/ |
DOI | 10.1109/Trustcom/BigDataSE/ICESS.2017.262 |
Citation Key | rezaeibagha_access_2017 |
- health care
- XACML policies
- XACML
- similarity analysis
- Security Policies Analysis
- security
- secure privacy-preserved EHR systems
- secure integrated systems
- pubcrawl
- privacy
- policy-based governance
- patients privacy
- large scale healthcare system
- hospitals
- Access Control
- electronic healthcare systems
- electronic health records
- electronic health record
- distributed systems
- distributed processing
- Data Security
- data privacy
- Cryptography
- computer network
- collaboration
- authorisation
- access control policy combination