Abstract
Smart hospital is a healthcare infrastructure that uses IoT technology. This intelligent space allows to collaborate a several health actors via their IoT devices. This coordination improves the quality and continuity of health services for better patient care. However, uncontrolled access to patient information can disrupt the smooth running of hospital services. In this paper, we aim to secure the information of patient exchanged and shared, using the privacy and access control based on the context. We develop two protocols, the first is a context-aware pseudonym service. It protects the patient’s personal and health information in two smart space hospital and home. Furthermore, we prevent the disclosure of the patient’s location during his hospital stay. The second is an authorization and delegation protocol based on trust, context and role. It oversees the actions and interactions of health body with the smart bracelet object of patient. Our protocol uses the context to generate a set of roles with their trust values. Only one role is activated if its trust value is greater than or equal to a trust threshold. A dynamic delegation mechanism is created to better manage the interactions between health bodies. We demonstrate through the practical analysis as well as generation time overhead, storage overhead and response time requirement the efficiency and robustness of our proposed protocols.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Aftab MU, Habib MA, Mehmood N, Aslam M, Irfan M (2015) Attributed role based access control model. In: Conference on information assurance and cyber security (CIACS), pp 83–89. https://doi.org/10.1109/CIACS.2015.7395571
AL-mawee W (2012) Privacy and security issues in iot healthcare applications for the disabled users a survey. Master’s Theses, Western Michigan University, p 651. https://scholarworks.wmich.edu/cgi/viewcontent.cgi?article=1661&context=masters_theses,
Aloulou H, Mokhtari M, Tiberghien T, Biswas J, Phua C, Lin JHK, Yap P (2013) Deployment of assistive living technology in a nursing home environment: methods and lessons learned. J BMC Med Inform Decis Mak 13(1):42. https://doi.org/10.1186/1472-6947-13-42
Atzori L, Lera A, Morabito G (2010) The internet of things: a survey. J Comput Netw 54(15):2787–2805. https://doi.org/10.1016/j.comnet.2010.05.010
Benferhat S, Tolba M, Tabia K, belkhir A (2016) Integrating non elementary actions in access control models. In: Proceedings of the 9th international conference on security of information and networks, pp 28–31. https://doi.org/10.1145/2947626.2951960
Bernabe JB, Ramos JLH, Gomez AFS (2016) Taciot: multidimensional trust-aware access control system for the internet of things. J Soft Comput 20(5):1763–1779. https://doi.org/10.1007/s00500-015-1705-6
Dey AK (2001) Understanding and using context. J Pers Ubiquitous Comput 5(1):4–7. https://doi.org/10.1007/s007790170019
Filho JB, Martin H (2009) A generalized context-based access control model for pervasive environments. In: Proceedings of the 2nd SIGSPATIAL ACM international workshop on security and privacy in GIS and LBS SPRINGL’09, pp 12–21. https://doi.org/10.1145/1667502.1667507
Fuhrer P, Guinard D (2006) Building a smart hospital using rfid technologies: use cases and implementation. In: 1st European conference on eHealth (ECEH06). https://pdfs.semanticscholar.org/1bc9/43643aa927abd4dc0b40702d8bd239f208ff.pdf
Haas S, Wohlgemuth S, Echizen I, Sonehara N, Müller G (2011) Aspects of privacy for electronic health records. Int J Med Inform 80(2):e26–e31. https://doi.org/10.1016/j.ijmedinf.2010.10.001
Hall R, Rinaldo A, Wasserman L (2013) Differential privacy for functions and functional data. J Mach Learn Res 14:703–727
Hong-Yue L, Miao-Lei D, Wei-Dong Y (2012) A context-aware fine-grained access control model. In: International conference on computer science and service system, pp 1099–1102. https://doi.org/10.1109/CSSS.2012.278
Jayant DB, Swapnaja AU, Sulabha SA, Dattatray GM (2014) Analysis of dac mac rbac access control based models for security. Int J Comput Appl 104(5):6–13. :https://pdfs.semanticscholar.org/45a2/775770d870b8675fb1301919224c9bcb7361.pdf
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput J 48:203–209. https://doi.org/10.1090/S0025-5718-1987-0866109-5
Li M, Yu S, Zheng Y, Ren K, Lou W (2012) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143. https://doi.org/10.1109/TPDS.2012.97
Li C, Raghunathan A, Jha NK (2011) Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In: IEEE 13th international conference on e-health networking, applications and services, pp 150–156. https://doi.org/10.1109/HEALTH.2011.6026732
Liu Y (2008) Trust-based access control for collaborative system. In: ISECS international colloquium on computing, communication, control, and management, pp 444–448. https://doi.org/10.1109/CCCM.2008.203
Magdy SAM (2013) Improve of health care systems for smart hospitals based on uml and xml. Int J Comput Inf Technol 02(03):484–491. https://ijcit.com/archives/volume2/issue3/Paper020320.pdf
Martínez S, Sánchez D, Valls A (2013) A semantic framework to protect the privacy of electronic health records with non-numerical attributes. J Biomed Inform 46(2):294–303. https://doi.org/10.1016/j.jbi.2012.11.005
Miller VS (1986) Uses of elliptic curves in cryptography. In: Proceedings of the conference on the theory and application of cryptographic techniques CRYPTO 1985: advances in cryptology, pp 417–426. https://doi.org/10.1007/3-540-39799-X_31
Ouaddah A, Mousannif H, Elkalam AA, Ouahman AA (2017) Access control in the internet of things: big challenges and new opportunities. J Comput Netw 112:237–262. https://doi.org/10.1016/j.comnet.2016.11.007
Priya P, Charles PJ, Kumar BR (2014) Context-aware architecture for user access control. Int J Adv Res Comput Sci Technol (IJARCST) 2(3):201–204. http://ijarcst.com/doc/vol2-issue3/ver.2/p_priya.pdf
Rivera D, Cruz-Piris L, Lopez-Civera G, de la Hoz E, Marsa-Maestre I (2015) Applying an unified access control for iot-based intelligent agent systems. In: IEEE 8th international conference on service-oriented computing and applications (SOCA), pp 247–251. https://doi.org/10.1109/SOCA.2015.40
Smari WW, Zhu J, Clemente P (2009) Trust and privacy in attribute based access control for collaboration environments. In: Proceedings of the 11th international conference on information integration and web-based applications & services, pp 49–55. https://doi.org/10.1145/1806338.1806356
Smari WW, Clemente P, Lalande JF (2014) An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. J Future Gener Comput Syst 31:147–168. https://doi.org/10.1016/j.future.2013.05.010
Suhendra V (2011) A survey on access control deployment. In: International conference on security technology, pp 11–20. https://doi.org/10.1007/978-3-642-27189-2_2
Sujansky WV, Faus SA, Stone E, Brennan PF (2010) A method to implement fine-grained access control for personal health records through standard relational database queries. J Biomed Inform 43(5):S46–S50. https://doi.org/10.1016/j.jbi.2010.08.001
Tajer A, Kar S, Poor HV, Cui S (2011) Distributed joint cyber attack detection and state recovery in smart grids. In: IEEE international conference on smart grid communications (SmartGridComm), pp 202–207. https://doi.org/10.1109/SmartGridComm.2011.6102319
Ukil A, Bandyopadhyay S, Pal A (2014) Iot-privacy: to be private or not to be private. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 123–124. https://doi.org/10.1109/INFCOMW.2014.6849186
Wang P, Jiang L (2015) Task-role-based access control model in smart health-care system. In: MATECWeb of conferences, vol 22, p 01,011. https://doi.org/10.1051/matecconf/20152201011
Wang XA, Ma J, Yang X (2015) A new proxy re-encryption scheme for protecting critical information systems. J Ambient Intell Humaniz Comput 6(6):699–711. https://doi.org/10.1007/s12652-015-0261-3
Wang XA, Ma J, Xhafa F, Zhang M, Luo X (2017) Cost-effective secure e-health cloud system using identity based cryptographic techniques. Future Gener Comput Syst 67:242–254. https://doi.org/10.1016/j.future.2016.08.008
Wang XA, Xhafa F, Ma J, Barolli L, Ge Y (2018) Pre+: dual of proxy re-encryption for secure cloud data sharing service. Int J Web Grid Serv 14(1):44–69. https://doi.org/10.1504/IJWGS.2018.088394
Yang L, Zheng Q, Fan X (2017) Rspp: a reliable, searchable and privacy-preserving ehealthcare system for cloud-assisted body area networks. In: IEEE international conference on computer communications (INFOCOM). https://doi.org/10.1109/INFOCOM.2017.8056954
Zerkouk M, Mhamed A, Messabih B (2013) A user profile based access control model and architecture. Int J Comput Netw Commun IJCNC 5(1):171–181. https://doi.org/10.5121/ijcnc.2013.5112
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zemmoudj, S., Bermad, N. & Omar, M. Context-aware pseudonymization and authorization model for IoT-based smart hospitals. J Ambient Intell Human Comput 10, 4473–4490 (2019). https://doi.org/10.1007/s12652-018-1129-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-1129-0