2022
DOI: 10.3390/s22010336
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society

Abstract: The ever-growing ecosystem of the Internet of Things (IoT) integrating with the ever-evolving wireless communication technology paves the way for adopting new applications in a smart society. The core concept of smart society emphasizes utilizing information and communication technology (ICT) infrastructure to improve every aspect of life. Among the variety of smart services, eHealth is at the forefront of these promises. eHealth is rapidly gaining popularity to overcome the insufficient healthcare services an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…Furthermore, access control for a chain of custody is similar to the access control issue for medical records in a Healthcare Information System. In this case, [24], [25] it provides a solution for the access control model for a collaborative environment in medical records. The analogy applied is a condition where several doctors from different departments handling a patient can access a medical record.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, access control for a chain of custody is similar to the access control issue for medical records in a Healthcare Information System. In this case, [24], [25] it provides a solution for the access control model for a collaborative environment in medical records. The analogy applied is a condition where several doctors from different departments handling a patient can access a medical record.…”
Section: Methodsmentioning
confidence: 99%
“…Some of the discussions include the requirements needed when interacting with digital evidence, as presented by [26] and [27], and the use of the Attribute-Based Access Control (ABAC) model to explain access control policies and XACML as an implementation of the policy language used as a hierarchical access control model proposed by [16]. Furthermore, despite the different domains, several access control solutions in the medical record/health record submitted by [25], [28] can be used to build access control solutions relevant to digital evidence.…”
Section: Methodsmentioning
confidence: 99%
“…Attackers can tamper with the devices, extract sensitive data, or inject malicious code. Implementing physical security measures such as tamper-resistant packaging, secure device placement, and access control to WBAN infrastructure can mitigate these risks [60], [61].…”
Section: Physical Access To Devicesmentioning
confidence: 99%
“…The revocation process is implemented to revoke malicious users or attributes, to increase security efficiency. However, this can lead to various attacks due to lack of time-based revocation [20]. In this paper, secure access control-based sharing of data is carried out in a decentralized manner.…”
Section: Introductionmentioning
confidence: 99%