2022
DOI: 10.1093/comjnl/bxac183
|View full text |Cite
|
Sign up to set email alerts
|

A Smart Contract-Based Access Control Framework For Smart Healthcare Systems

Abstract: Security faces huge challenges in Internet of Things (IoT) environments. In particular, conventional access control standards and models tend to be less tailored for IoT due to the constrained nature of smart objects. Usually, a powerful third party is used to handle the access control logic. However, this third party is lacking in transparency and could harm user privacy. Therefore, providing a distributed access control solution, while considering transparency and privacy-preserving awareness in IoT smart sy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Control mechanisms, such as firewalls, intrusion detection/prevention systems, access controls, and network monitoring tools, play a critical role in managing network traffic, detecting anomalies, and enforcing security policies. However, mis-configuration or improper management of these mechanisms can inadvertently introduce vulnerabilities or disrupt network operations [191], [192]. Therefore, network administrators must exercise caution in configuring and deploying control mechanisms, ensuring they are aligned with organizational security policies and best practices [193].…”
Section: Key Findingsmentioning
confidence: 99%
“…Control mechanisms, such as firewalls, intrusion detection/prevention systems, access controls, and network monitoring tools, play a critical role in managing network traffic, detecting anomalies, and enforcing security policies. However, mis-configuration or improper management of these mechanisms can inadvertently introduce vulnerabilities or disrupt network operations [191], [192]. Therefore, network administrators must exercise caution in configuring and deploying control mechanisms, ensuring they are aligned with organizational security policies and best practices [193].…”
Section: Key Findingsmentioning
confidence: 99%
“…Wang et al [30] harmonized identity-based encryption (IBE) and blockchain to design a privacy-aware access control system. Saini et al [31] proposed a smart contract-based access control framework to secure the sharing of EMRs among different hospitals. In their proposal, four types of smart contracts are designed to realize access verification, permission management, and data exchange, respectively.…”
Section: B Smart Contract-based Access Controlmentioning
confidence: 99%